Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
1b2ca79cca5e5492588d3d2661fc858a_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
1b2ca79cca5e5492588d3d2661fc858a_JaffaCakes118.dll
-
Size
990KB
-
MD5
1b2ca79cca5e5492588d3d2661fc858a
-
SHA1
a7a57ae852789a84636ee60383edaf89b4b91f28
-
SHA256
75a98ffedbb5dee82b11bc4a19ac10b9d58d8080ec4c4be4f70bff6ed3428cbe
-
SHA512
416dc8c67d95eab78e7567b0a5e0a5f4f6a454ed4d663d1cfa072cb331543e6e73834bdb5b32349cc77a5b79f6d3fb61ddb5530745ac8f4a6c1934c37913f41a
-
SSDEEP
24576:IVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8zt:IV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3544-4-0x00000000024C0000-0x00000000024C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
EhStorAuthn.exeAtBroker.exemsinfo32.exepid process 4716 EhStorAuthn.exe 2788 AtBroker.exe 4400 msinfo32.exe -
Loads dropped DLL 3 IoCs
Processes:
EhStorAuthn.exeAtBroker.exemsinfo32.exepid process 4716 EhStorAuthn.exe 2788 AtBroker.exe 4400 msinfo32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jrbkpoyx = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Collab\\UQf4x34Ykfy\\AtBroker.exe" -
Processes:
rundll32.exeEhStorAuthn.exeAtBroker.exemsinfo32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AtBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4948 rundll32.exe 4948 rundll32.exe 4948 rundll32.exe 4948 rundll32.exe 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3544 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3544 wrote to memory of 1608 3544 EhStorAuthn.exe PID 3544 wrote to memory of 1608 3544 EhStorAuthn.exe PID 3544 wrote to memory of 4716 3544 EhStorAuthn.exe PID 3544 wrote to memory of 4716 3544 EhStorAuthn.exe PID 3544 wrote to memory of 4960 3544 AtBroker.exe PID 3544 wrote to memory of 4960 3544 AtBroker.exe PID 3544 wrote to memory of 2788 3544 AtBroker.exe PID 3544 wrote to memory of 2788 3544 AtBroker.exe PID 3544 wrote to memory of 3772 3544 msinfo32.exe PID 3544 wrote to memory of 3772 3544 msinfo32.exe PID 3544 wrote to memory of 4400 3544 msinfo32.exe PID 3544 wrote to memory of 4400 3544 msinfo32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b2ca79cca5e5492588d3d2661fc858a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵
-
C:\Users\Admin\AppData\Local\kFlK\EhStorAuthn.exeC:\Users\Admin\AppData\Local\kFlK\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\AtBroker.exeC:\Windows\system32\AtBroker.exe1⤵
-
C:\Users\Admin\AppData\Local\dzjNa8\AtBroker.exeC:\Users\Admin\AppData\Local\dzjNa8\AtBroker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵
-
C:\Users\Admin\AppData\Local\pytpZzSM\msinfo32.exeC:\Users\Admin\AppData\Local\pytpZzSM\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\dzjNa8\AtBroker.exeFilesize
90KB
MD530076e434a015bdf4c136e09351882cc
SHA1584c958a35e23083a0861421357405afd26d9a0c
SHA256ae7b1e298a6e38f0a3428151bfc5565ede50a8d98dafaa147b13cf89c61f2ddd
SHA512675e310c2455acf9220735f34fa527afe87dac691e89cc0edc3c4659147e9fd223f96b7a3beea532047aa0ebc58880a7010343019a50aa73ce69a038e3592024
-
C:\Users\Admin\AppData\Local\dzjNa8\UxTheme.dllFilesize
993KB
MD5ce4092286f1bc79372caa0915c9a8845
SHA1c04c8b7dccffbd36ec9758a74a45efe1e75378ec
SHA256a01bcf704c9374e318445d6d9e3c83ea24bb5b03ed1e694e51456ff18d6caae6
SHA512eb44ff7bfb3a7a03976b6563d891250a24e0d6b5350a62094dbe88dcc432a86e724bdc8b4c5e51cedccdd1f6eb26dcb83f6ab8800fb83ea37fbe758886201381
-
C:\Users\Admin\AppData\Local\kFlK\EhStorAuthn.exeFilesize
128KB
MD5d45618e58303edb4268a6cca5ec99ecc
SHA11f8049fc5ea8b57bb68e19fb55cb9dc1e18e9513
SHA256d527323643be9df4d174c3169c6f2c7854a59b781654bcaebd154cb51fb4219c
SHA5125d7ae663dcfedfaf00836dc018131851e5a40778bd582b417b9f0bbd4bb6d1b2eb8f37f7f5a01cd2beed78b6037ef6eb2a3290248d5e901173b1407990a202bd
-
C:\Users\Admin\AppData\Local\kFlK\UxTheme.dllFilesize
993KB
MD5efba8adc274630a47baa2758cc6f6a75
SHA1af5afc1eec3fdfef38a11a1fd9d81d28195806b9
SHA25697d75089ea1a97f74cc0a343fc6d1623b38c332ef015874e2429720f21e4de21
SHA512fb85c2d46ba8eb921e9d54c7dee0774945f188acbcd78b78f5081ce72bfe43dc230bf59e4e7be3bd013c73b90842e6ca59b4a944abee4ec31c96ed539a0a8022
-
C:\Users\Admin\AppData\Local\pytpZzSM\MFC42u.dllFilesize
1018KB
MD563e6d7ea4a540ff9141da9e73c6bb4ec
SHA1d44a101fb18a49760a4f036101a4bd61a45025e0
SHA256b2e268020496f233a73dc06605f364a532ae6abccec7b14b2d79e6f63028b514
SHA512d9debcb5903634ff17ceade3a841c077a60318ddd89680f950923eb4c0296c0b5735a59dd9d831ba92c286b5bd995901cbb8dc8c81db2454a965b92131ccf35b
-
C:\Users\Admin\AppData\Local\pytpZzSM\msinfo32.exeFilesize
376KB
MD50aed91da63713bf9f881b03a604a1c9d
SHA1b1b2d292cb1a4c13dc243b5eab13afb316a28b9a
SHA2565cf1604d2473661266e08fc0e4e144ea98f99b7584c43585eb2b01551130fd14
SHA51204bca9b321d702122b6e72c2ad15b7cd98924e5dfc3b8dd0e907ea28fd7826d3f72b98c67242b6698594df648d3c2b6b0952bb52a2363b687bbe44a66e830c03
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Xzasfouulwckbw.lnkFilesize
1KB
MD568a63da172eab2efa3464ac9c1ff16c7
SHA10af2076578573855b4d2173ba465ffeec39cd45e
SHA2564b802cfef1698374dd59e458e734d25952fbaf6b8f4ab33be799e348b6c4a145
SHA512a8ccf07405178ca0e57d74b18e8a57a8fdfbaa38cfc1af201c4f2ef97abe93f0ea7514c640c55b3582d555de4997819ec25127cdb616cbb57cf12d5fb6c91afa
-
memory/2788-67-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2788-64-0x0000020C867A0000-0x0000020C867A7000-memory.dmpFilesize
28KB
-
memory/3544-31-0x0000000001E20000-0x0000000001E27000-memory.dmpFilesize
28KB
-
memory/3544-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-6-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-4-0x00000000024C0000-0x00000000024C1000-memory.dmpFilesize
4KB
-
memory/3544-30-0x00007FFB9079A000-0x00007FFB9079B000-memory.dmpFilesize
4KB
-
memory/3544-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-22-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-32-0x00007FFB91F50000-0x00007FFB91F60000-memory.dmpFilesize
64KB
-
memory/3544-34-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4400-80-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/4400-83-0x0000020406B00000-0x0000020406B07000-memory.dmpFilesize
28KB
-
memory/4400-86-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/4716-50-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4716-44-0x000001F4DC0C0000-0x000001F4DC0C7000-memory.dmpFilesize
28KB
-
memory/4716-45-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4948-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4948-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4948-3-0x00000255B7460000-0x00000255B7467000-memory.dmpFilesize
28KB