Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
1ac433a51896469ce8de0c2112476c6b_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
1ac433a51896469ce8de0c2112476c6b_JaffaCakes118.dll
-
Size
987KB
-
MD5
1ac433a51896469ce8de0c2112476c6b
-
SHA1
5c865ccaac2a42edeeca9faa7928a8b578fc95d5
-
SHA256
de768935312e545c65bc8eb1f91461fb2729fcb0517af6efdbdca5c9b6cb6c66
-
SHA512
112a8ba84ca41f00c0fe649b70453f07851a973ec018488fab0ec5e57bc28378f4c520ea607e31f8251163cfa8a6c69b7d2352609ab0d917a7d4319f07aef4d4
-
SSDEEP
24576:6VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:6V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3528-4-0x0000000003020000-0x0000000003021000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesComputerName.exeSystemPropertiesAdvanced.exesystemreset.exepid process 3280 SystemPropertiesComputerName.exe 4512 SystemPropertiesAdvanced.exe 2544 systemreset.exe -
Loads dropped DLL 4 IoCs
Processes:
SystemPropertiesComputerName.exeSystemPropertiesAdvanced.exesystemreset.exepid process 3280 SystemPropertiesComputerName.exe 4512 SystemPropertiesAdvanced.exe 2544 systemreset.exe 2544 systemreset.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jhyzxpkzi = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\Jj\\SYSTEM~1.EXE" -
Processes:
SystemPropertiesComputerName.exeSystemPropertiesAdvanced.exesystemreset.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA systemreset.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 3996 regsvr32.exe 3996 regsvr32.exe 3996 regsvr32.exe 3996 regsvr32.exe 3996 regsvr32.exe 3996 regsvr32.exe 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3528 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3528 wrote to memory of 4048 3528 SystemPropertiesComputerName.exe PID 3528 wrote to memory of 4048 3528 SystemPropertiesComputerName.exe PID 3528 wrote to memory of 3280 3528 SystemPropertiesComputerName.exe PID 3528 wrote to memory of 3280 3528 SystemPropertiesComputerName.exe PID 3528 wrote to memory of 3640 3528 SystemPropertiesAdvanced.exe PID 3528 wrote to memory of 3640 3528 SystemPropertiesAdvanced.exe PID 3528 wrote to memory of 4512 3528 SystemPropertiesAdvanced.exe PID 3528 wrote to memory of 4512 3528 SystemPropertiesAdvanced.exe PID 3528 wrote to memory of 4064 3528 systemreset.exe PID 3528 wrote to memory of 4064 3528 systemreset.exe PID 3528 wrote to memory of 2544 3528 systemreset.exe PID 3528 wrote to memory of 2544 3528 systemreset.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1ac433a51896469ce8de0c2112476c6b_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵
-
C:\Users\Admin\AppData\Local\COQW\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\COQW\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵
-
C:\Users\Admin\AppData\Local\PFYyr57s\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\PFYyr57s\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\systemreset.exeC:\Windows\system32\systemreset.exe1⤵
-
C:\Users\Admin\AppData\Local\9ak\systemreset.exeC:\Users\Admin\AppData\Local\9ak\systemreset.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9ak\ReAgent.dllFilesize
989KB
MD5ea67dcb9b03937fcee3e2be787fd011d
SHA1eb7e44e0c329e78137b6f747ec1f5d4f1d321192
SHA256e8532eceaed93a4cf71a5e70e175f22c46d88227caa98843a7b935a86469f2e7
SHA5125329f1f19a5670a9c0224a7d7f77d954158725812f917950e69f177224f369e863b891338feda3b531638f94574bb215aaf0032baf1e040d9c108acedab185c1
-
C:\Users\Admin\AppData\Local\9ak\systemreset.exeFilesize
508KB
MD5325ff647506adb89514defdd1c372194
SHA184234ff97d6ddc8a4ea21303ea842aa76a74e0ea
SHA256ebff6159a7627234f94f606afa2e55e98e1548fd197d22779a5fcff24aa477ad
SHA5128a9758f4af0264be08d684125827ef11efe651138059f6b463c52476f8a8e1bed94d093042f85893cb3e37c5f3ba7b55c6ce9394595001e661bccbc578da3868
-
C:\Users\Admin\AppData\Local\COQW\SYSDM.CPLFilesize
988KB
MD5364ae88f2734d0c32192594e70609e0e
SHA1eb5d888025ea449f94821f9c27be2a6267e9e6af
SHA25684f22f1ca2817ebde8443d073f9dda75f9f02f3db63fd6a7b1607ea77e671cd2
SHA51225689c1dba5536f903964152aa7fcce1bad73f1c793fcd49c320c1b72ed8fea672e3e94e37955ebc0df7d1b4b297479cbdaa403291f1eb646401cfcf1f6920e0
-
C:\Users\Admin\AppData\Local\COQW\SystemPropertiesComputerName.exeFilesize
82KB
MD56711765f323289f5008a6a2a04b6f264
SHA1d8116fdf73608b4b254ad83c74f2232584d24144
SHA256bd3a97327326e2245938ec6099f20059b446ff0fe1c10b9317d15d1a1dd5331e
SHA512438abd282d9d1c0e7e5db2ce027ff9522c3980278b32b2eae09c595884a8dcbfd5178bc5926b1d15f03174303382e13f5d5ecab9a5d8e31fc07ef39e66c012e8
-
C:\Users\Admin\AppData\Local\PFYyr57s\SYSDM.CPLFilesize
988KB
MD5129bf8ae6f20fa7dea0e7f095c5b504b
SHA10fcf38b9265c6cccf79222d1d0113652c1564678
SHA256e25221c5bc08f397ca6abc6614ce69c474b01bffe5058f76c1cb4efd039024ae
SHA5127367b7fb21c98df699e7522fef260b97b166828a8fd509b853e59c5ec9e8619f61095351db785610cb015e7dc59db908b4e1406af466490e28b59daa3f755663
-
C:\Users\Admin\AppData\Local\PFYyr57s\SystemPropertiesAdvanced.exeFilesize
82KB
MD5fa040b18d2d2061ab38cf4e52e753854
SHA1b1b37124e9afd6c860189ce4d49cebbb2e4c57bc
SHA256c61fa0f8c5d8d61110adbcceaa453a6c1d31255b3244dc7e3b605a4a931c245c
SHA512511f5981bd2c446f1f3039f6674f972651512305630bd688b1ef159af36a23cb836b43d7010b132a86b5f4d6c46206057abd31600f1e7dc930cb32ed962298a4
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Usvyddaywmbx.lnkFilesize
1KB
MD5f4993befe74ddbc52224f8c9f2a3fe59
SHA10b6fabc2deb529544f4de5790fa8b0e12a6c0090
SHA256cb9988914e77499fe00a1273169c03c20dc357b65fbba9261b244dd29b794ace
SHA512b5950f6d8592b2559f2e09cbeb93a327e3d7835662aefac335889a7fa65a1a8258d493d31d336afb47735f4d8c784e918398ca6093b770ad2b71ff9962762ce7
-
memory/2544-84-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3280-50-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3280-47-0x000001451DB80000-0x000001451DB87000-memory.dmpFilesize
28KB
-
memory/3280-44-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3528-31-0x0000000001010000-0x0000000001017000-memory.dmpFilesize
28KB
-
memory/3528-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-22-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-30-0x00007FFDBF49A000-0x00007FFDBF49B000-memory.dmpFilesize
4KB
-
memory/3528-34-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-4-0x0000000003020000-0x0000000003021000-memory.dmpFilesize
4KB
-
memory/3528-32-0x00007FFDC1370000-0x00007FFDC1380000-memory.dmpFilesize
64KB
-
memory/3528-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3528-6-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3996-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3996-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3996-3-0x0000000002840000-0x0000000002847000-memory.dmpFilesize
28KB
-
memory/4512-67-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4512-64-0x0000024466A70000-0x0000024466A77000-memory.dmpFilesize
28KB