Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
1a284e601d4b39b13a2c1ea67fe0433b_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
1a284e601d4b39b13a2c1ea67fe0433b_JaffaCakes118.dll
-
Size
986KB
-
MD5
1a284e601d4b39b13a2c1ea67fe0433b
-
SHA1
396f1bbc283017fe8a3df5bd487d2731e7fe347f
-
SHA256
3b7790a2520c63e35ddae8ac5a3aed6c09b16a1a3506d414c6aedfc65cba9b34
-
SHA512
eb7ffe8c4f1da82e188214ed7af8ddd518afb30173cf058ac6ff54176f357fb95f629f36965342b5791dd5b85a82d5a9c8965866f480e356c4adba156f1d3386
-
SSDEEP
24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3436-4-0x0000000002AE0000-0x0000000002AE1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemSettingsAdminFlows.exerdpshell.exeSppExtComObj.Exepid process 5768 SystemSettingsAdminFlows.exe 5724 rdpshell.exe 4524 SppExtComObj.Exe -
Loads dropped DLL 3 IoCs
Processes:
SystemSettingsAdminFlows.exerdpshell.exeSppExtComObj.Exepid process 5768 SystemSettingsAdminFlows.exe 5724 rdpshell.exe 4524 SppExtComObj.Exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iwctvdcrnln = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\Recent\\Prp2VOTi\\rdpshell.exe" -
Processes:
SystemSettingsAdminFlows.exerdpshell.exeSppExtComObj.Exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsAdminFlows.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SppExtComObj.Exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3436 wrote to memory of 2104 3436 SystemSettingsAdminFlows.exe PID 3436 wrote to memory of 2104 3436 SystemSettingsAdminFlows.exe PID 3436 wrote to memory of 5768 3436 SystemSettingsAdminFlows.exe PID 3436 wrote to memory of 5768 3436 SystemSettingsAdminFlows.exe PID 3436 wrote to memory of 3736 3436 rdpshell.exe PID 3436 wrote to memory of 3736 3436 rdpshell.exe PID 3436 wrote to memory of 5724 3436 rdpshell.exe PID 3436 wrote to memory of 5724 3436 rdpshell.exe PID 3436 wrote to memory of 1636 3436 SppExtComObj.Exe PID 3436 wrote to memory of 1636 3436 SppExtComObj.Exe PID 3436 wrote to memory of 4524 3436 SppExtComObj.Exe PID 3436 wrote to memory of 4524 3436 SppExtComObj.Exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a284e601d4b39b13a2c1ea67fe0433b_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
C:\Windows\system32\SystemSettingsAdminFlows.exeC:\Windows\system32\SystemSettingsAdminFlows.exe1⤵PID:2104
-
C:\Users\Admin\AppData\Local\Sso8n7qgT\SystemSettingsAdminFlows.exeC:\Users\Admin\AppData\Local\Sso8n7qgT\SystemSettingsAdminFlows.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5768
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:3736
-
C:\Users\Admin\AppData\Local\GmB\rdpshell.exeC:\Users\Admin\AppData\Local\GmB\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5724
-
C:\Windows\system32\SppExtComObj.ExeC:\Windows\system32\SppExtComObj.Exe1⤵PID:1636
-
C:\Users\Admin\AppData\Local\C2Yex\SppExtComObj.ExeC:\Users\Admin\AppData\Local\C2Yex\SppExtComObj.Exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
987KB
MD5972d588fed89ed5d5e26b95b2b89baf0
SHA1672993fc7474e1592c86ad8c23dd3ed30cebed12
SHA256e530ac70cbc608133caabfd769b324da2a2fc7d8ebcd45635086ad7371be6222
SHA5121ff9371584cb65fffeac5f506cdb2a5fa1361fd98937810cee127cea7958005f10baffd0e2e65cf3e4037547e5139c15e824e872c74900425d894ea82ce7acdd
-
Filesize
559KB
MD5728a78909aa69ca0e976e94482350700
SHA16508dfcbf37df25cae8ae68cf1fcd4b78084abb7
SHA2562a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c
SHA51222bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1
-
Filesize
988KB
MD518bc3fd089fd7e3c85f6b57b9587bdb3
SHA197f155f18698f646dbebe3e73d671b84742aed1b
SHA256244ded450ab1cf7fcb3342cef2d2a73b6266f4feb2ea580de7ad11bfbb618fc9
SHA512fa3d9dd5977e3b8b315ac60047459ad3b6433e95fc94aaf4489caf28f6c24716cdcd0b575f0b91abf65d51452a204b7decab103239e7a06afaa25cc38fee2cbb
-
Filesize
468KB
MD5428066713f225bb8431340fa670671d4
SHA147f6878ff33317c3fc09c494df729a463bda174c
SHA256da6c395a2018d3439ad580a19e6a1ca5ff29ef9074411ee9f9f1b0a6365dfebd
SHA512292aad2762ae4dc519c69411aa114a29894f60ffac103813db4946f2fac4f5a166f66523c421529d6847c0882d8ab467392ee8da1e3a4fca0d6d4e6ebda5b737
-
Filesize
1.2MB
MD5311588e29d856f1995386eb54e6460ea
SHA1ce4ef3abb54aaafeeaa9f21f39da1578da901555
SHA25689e723cbcd985df46a7da056cbe94511c508963bbefb475ef56c230025ea63e3
SHA51212756b1a11cfb3078927f409392e298926509fd8765a38e43f86abef86449f91a094bb4c414a1fde562108396656f643f8aee7ad44b1a353ee442871f4623660
-
Filesize
506KB
MD550adb2c7c145c729b9de8b7cf967dd24
SHA1a31757f08da6f95156777c1132b6d5f1db3d8f30
SHA256a7a2e7122d27308df37b7ab718ef3ac239e4216669f51331e34e205f59fb0aec
SHA512715b4c93e79e896da1cf86cf4455a84cba1aeac34b6fd72d2afdf203a2034f6f8fac1d6501f0dd277a17bd1d7ab73ddd1887e01a99f2d26f39efeb94d0aac9b0
-
Filesize
1KB
MD58dfb2c3334a3a0c1f507695dd5885498
SHA1d90d2a8fd04e5cd0ad9096b0859fbc02dc99dc3d
SHA2565c43863cef09f9e651743ed346db5036614177da32d2e254c41f3b952da18940
SHA512dc6d73a95f2b2e3d17720b6623e75a85862b7c7e4eaa86e5ea4d8b682dc4bd94a8b07ff012ea227f87ea5f6f03c5f6423422551f96707ec6a363f4477da41fb9