Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
1d19acd154bf1676f07c6ca4ade6d4d6_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
1d19acd154bf1676f07c6ca4ade6d4d6_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
1d19acd154bf1676f07c6ca4ade6d4d6
-
SHA1
ebbf27f296de3c89a58021d31e054204698ab477
-
SHA256
46041e5c693d0750c1d45de49962be9a767692f56c79ead576198d48ca0ed5d5
-
SHA512
1dcb97135d50c4e6ddf243473883440ad34537fd54aae72929e7a1c4d57c1e301400ccd2c4c870e127bee8be69052b796f3a222b9bc4f41c73b033cb80f4f210
-
SSDEEP
24576:FVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:FV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3528-4-0x0000000003240000-0x0000000003241000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
RecoveryDrive.exeSystemPropertiesAdvanced.exesessionmsg.exepid process 2564 RecoveryDrive.exe 3756 SystemPropertiesAdvanced.exe 1772 sessionmsg.exe -
Loads dropped DLL 3 IoCs
Processes:
RecoveryDrive.exeSystemPropertiesAdvanced.exesessionmsg.exepid process 2564 RecoveryDrive.exe 3756 SystemPropertiesAdvanced.exe 1772 sessionmsg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wuaobpzp = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Proof\\MfoQ6gU\\SystemPropertiesAdvanced.exe" -
Processes:
SystemPropertiesAdvanced.exesessionmsg.exerundll32.exeRecoveryDrive.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RecoveryDrive.exe -
Modifies registry class 3 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3096 rundll32.exe 3096 rundll32.exe 3096 rundll32.exe 3096 rundll32.exe 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 Token: SeShutdownPrivilege 3528 Token: SeCreatePagefilePrivilege 3528 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3528 3528 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3528 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3528 wrote to memory of 1628 3528 RecoveryDrive.exe PID 3528 wrote to memory of 1628 3528 RecoveryDrive.exe PID 3528 wrote to memory of 2564 3528 RecoveryDrive.exe PID 3528 wrote to memory of 2564 3528 RecoveryDrive.exe PID 3528 wrote to memory of 2980 3528 SystemPropertiesAdvanced.exe PID 3528 wrote to memory of 2980 3528 SystemPropertiesAdvanced.exe PID 3528 wrote to memory of 3756 3528 SystemPropertiesAdvanced.exe PID 3528 wrote to memory of 3756 3528 SystemPropertiesAdvanced.exe PID 3528 wrote to memory of 5072 3528 sessionmsg.exe PID 3528 wrote to memory of 5072 3528 sessionmsg.exe PID 3528 wrote to memory of 1772 3528 sessionmsg.exe PID 3528 wrote to memory of 1772 3528 sessionmsg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d19acd154bf1676f07c6ca4ade6d4d6_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
C:\Windows\system32\RecoveryDrive.exeC:\Windows\system32\RecoveryDrive.exe1⤵PID:1628
-
C:\Users\Admin\AppData\Local\BcMw4F06w\RecoveryDrive.exeC:\Users\Admin\AppData\Local\BcMw4F06w\RecoveryDrive.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2564
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵PID:2980
-
C:\Users\Admin\AppData\Local\QvGyJhC\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\QvGyJhC\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3756
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵PID:5072
-
C:\Users\Admin\AppData\Local\fKkhWk\sessionmsg.exeC:\Users\Admin\AppData\Local\fKkhWk\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
911KB
MD5b9b3dc6f2eb89e41ff27400952602c74
SHA124ae07e0db3ace0809d08bbd039db3a9d533e81b
SHA256630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4
SHA5127906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe
-
Filesize
1.2MB
MD5c41d6839c1f1ca4ec73f9eaf2409e1fa
SHA163882ba7db843a8d4e3657f7caea97f80ea4cda8
SHA25697d6ab96faa525efd791c1f38f6b9720522b8cac00d1a3edd25c9e0faed3f3be
SHA512fd2accf4b4fe1cc7a85d819ebf0dbeca8adefb1b9660dbc24dff86f51a11d16b07c23f44eff50c0357ec9969b5def4746b58f5ba32920005c8005b4044914206
-
Filesize
1.2MB
MD5f2e64830a2c214738968617c3647f9e1
SHA168d13f550dd4b7ca079d38f45f773ca1c06096b9
SHA2565a3b92a6a9bfeb85b94f5df7363244fe95b6c98782f564a42e6a00a0279d105a
SHA512e0a549b0b0787d87b4d191ce8c65fe93b3cca78cff1c875ec9d51633cb016f63ffaef1e46939cca2111f9a97cab655cb72858c426d92f54d1d2d6d084c3eba51
-
Filesize
82KB
MD5fa040b18d2d2061ab38cf4e52e753854
SHA1b1b37124e9afd6c860189ce4d49cebbb2e4c57bc
SHA256c61fa0f8c5d8d61110adbcceaa453a6c1d31255b3244dc7e3b605a4a931c245c
SHA512511f5981bd2c446f1f3039f6674f972651512305630bd688b1ef159af36a23cb836b43d7010b132a86b5f4d6c46206057abd31600f1e7dc930cb32ed962298a4
-
Filesize
1.2MB
MD54ad7655783f220338f7f6539ec36a6c6
SHA120ccd6cbffcf18b231d9182b75e1a4fbce71edfd
SHA256baaa1073b0a84c71aaf4ccce1847eec64d49dec422514b799905712d9e81b664
SHA5127ee30807c02d8a2c3911c70df7c0482656ecb7cb66976ad2a69c752a2660be3725629ab3c9e2fd20f6fe0036466b20c9cbe036340fef73365c0533c177e13c95
-
Filesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
Filesize
1KB
MD51b40ee13acc468596e7244c2b6b59d8b
SHA1c897cba440a1a12ab2b0cdafe3b970e7676de2e9
SHA25623a6714bd9005dbc6d72e82acd8ef0814e1d6bac1249db2c84d844132640464e
SHA51279e0775a933884f99ec2ee832042553b02ebfee556ec81bc2deff0ce92ec6b1cbf0e89db8c4c04f5fba55e3cd41af730393f8e66fe132d7d583a1e6fa7fa9bc5