Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
2247a1e7c2f18b255f28ef00d2d930f8_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
2247a1e7c2f18b255f28ef00d2d930f8_JaffaCakes118.dll
-
Size
989KB
-
MD5
2247a1e7c2f18b255f28ef00d2d930f8
-
SHA1
bd852bcc11266bd28c494b6bf036e5710d90c2f2
-
SHA256
3fa05daafcd5984a5c5e340e6b78138c8f3527eb35ba647f79c16b34a48eb9fd
-
SHA512
f4031a1236b6ced52fabe05934a4359fb0d352715d80f02c864cc3870c1a4917a3137eee7fba5ef5c93b8d7e11c4bd25c3d6225e9ea8589061c48f9d7ca7e6aa
-
SSDEEP
24576:JVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:JV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3360-4-0x0000000002F10000-0x0000000002F11000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dccw.exeshrpubw.exemsconfig.exepid process 4492 dccw.exe 3872 shrpubw.exe 3192 msconfig.exe -
Loads dropped DLL 3 IoCs
Processes:
dccw.exeshrpubw.exemsconfig.exepid process 4492 dccw.exe 3872 shrpubw.exe 3192 msconfig.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ovnmkkvrgnxhq = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\25gLtu\\shrpubw.exe" -
Processes:
rundll32.exedccw.exeshrpubw.exemsconfig.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3360 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3360 wrote to memory of 876 3360 dccw.exe PID 3360 wrote to memory of 876 3360 dccw.exe PID 3360 wrote to memory of 4492 3360 dccw.exe PID 3360 wrote to memory of 4492 3360 dccw.exe PID 3360 wrote to memory of 2224 3360 shrpubw.exe PID 3360 wrote to memory of 2224 3360 shrpubw.exe PID 3360 wrote to memory of 3872 3360 shrpubw.exe PID 3360 wrote to memory of 3872 3360 shrpubw.exe PID 3360 wrote to memory of 2736 3360 msconfig.exe PID 3360 wrote to memory of 2736 3360 msconfig.exe PID 3360 wrote to memory of 3192 3360 msconfig.exe PID 3360 wrote to memory of 3192 3360 msconfig.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2247a1e7c2f18b255f28ef00d2d930f8_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵
-
C:\Users\Admin\AppData\Local\Bjri4Kg\dccw.exeC:\Users\Admin\AppData\Local\Bjri4Kg\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵
-
C:\Users\Admin\AppData\Local\cNmfskFZd\shrpubw.exeC:\Users\Admin\AppData\Local\cNmfskFZd\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵
-
C:\Users\Admin\AppData\Local\H1cvlen9\msconfig.exeC:\Users\Admin\AppData\Local\H1cvlen9\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Bjri4Kg\dccw.exeFilesize
101KB
MD5cb9374911bf5237179785c739a322c0f
SHA13f4d3dd3d58c9f19dfbb414ded16969ebd9f74b9
SHA256f7f3300b78148a34f6a35796c777a832b638b6d3193e11f4a37f45d4c6dfa845
SHA5129d47521538148b1823c0a17baa86ddf932f06f46d5d8b63fa87b2cc220fb98ce3f933e32d771222937bb8e41c88030839d489d1cd78b062bffeb2980dc6864be
-
C:\Users\Admin\AppData\Local\Bjri4Kg\mscms.dllFilesize
995KB
MD5d8035229009f1291b0ccfb01a01e62d0
SHA157a3ee45627287fd9165776604c22beb8cf1a9ef
SHA256b83c64a0171d9d5175064ba037ef31d72be5181536b312742014a1e707b091a5
SHA512f7e41966c94ee2eecbd2eaed82baeda0a52fdb72e52a9be176f32a4123f010be9c35dbf71253557d250488db1ae67a9dc90dde0ef8fef4d69723a9d676c42af0
-
C:\Users\Admin\AppData\Local\H1cvlen9\VERSION.dllFilesize
990KB
MD550732f8b0b5f9505578ccdb78ad08d03
SHA10ba6420d6bebf669adc906cd82453e052c96c175
SHA25658551b3c732211a43997486e843d26085805858a6a4cb1bc4e11d72da82ec107
SHA512d93c810f1a1ad830db25e0d1cfa67de7f5059cfa0420cd4752c19b132cb93dd8b03877ee9ad2ae6147f0b1946f1956b2eabf16c58cae17cc708d8a6c4f382233
-
C:\Users\Admin\AppData\Local\H1cvlen9\msconfig.exeFilesize
193KB
MD539009536cafe30c6ef2501fe46c9df5e
SHA16ff7b4d30f31186de899665c704a105227704b72
SHA25693d2604f7fdf7f014ac5bef63ab177b6107f3cfc26da6cbd9a7ab50c96564a04
SHA51295c9a8bc61c79108634f5578825544323e3d980ae97a105a325c58bc0e44b1d500637459969602f08d6d23d346baec6acd07d8351803981000c797190d48f03a
-
C:\Users\Admin\AppData\Local\cNmfskFZd\shrpubw.exeFilesize
59KB
MD59910d5c62428ec5f92b04abf9428eec9
SHA105f27d7515e8ae1fa3bc974ec65b864ec4c9ac8b
SHA2566b84e6e55d8572d7edf0b6243d00abb651fcb0cddddac8461de5f9bb80035a2e
SHA51201be043f7ff879a683e53962eec58456ba200d6787ea66581bb62669ae65d5e58a5577cdf23441165f7a535fce1dec933e3ad2465c72172b4a1488b24ce722cb
-
C:\Users\Admin\AppData\Local\cNmfskFZd\srvcli.dllFilesize
991KB
MD573567f044e40f17c0696d2cb6ffeb368
SHA1b96dc5765734e271801f694ba319e315a434e186
SHA2566c231ced6d6052796800cba18a8c48944d0f78aeef415f228a51c6dccdb75907
SHA5129b8eaee50ae78c55b913a7f096a19b3fa6a2ee2f97428fc962d5b6ca5199591f3de3198a32020209751ff5c000eaa470f4f4a421d3207bd99acf79d4982d3ca6
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ymfrpxarx.lnkFilesize
1KB
MD50a56fffce307e2f390db693f8bb29b24
SHA1c1bcc7e2ce08fde370cd0bb4c656f93fbdd8ccff
SHA256fd6741f161b98e42c61470a378d003f19a50c80e8cb50bd6a041dc496394ebf2
SHA512b6ff5c6e2534f4467b99b1fa4d648438d8dcfd32af70e3cb2a94d3b2293f94664e6419475eb7ab257991a2774b8af7a06505f19950799cf889e6724daf29ee81
-
memory/2364-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2364-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2364-0-0x000002B1C6940000-0x000002B1C6947000-memory.dmpFilesize
28KB
-
memory/3192-84-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3192-81-0x000001A155460000-0x000001A155467000-memory.dmpFilesize
28KB
-
memory/3360-30-0x00007FFB5212A000-0x00007FFB5212B000-memory.dmpFilesize
4KB
-
memory/3360-4-0x0000000002F10000-0x0000000002F11000-memory.dmpFilesize
4KB
-
memory/3360-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-34-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-32-0x00007FFB53350000-0x00007FFB53360000-memory.dmpFilesize
64KB
-
memory/3360-6-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-31-0x0000000000F40000-0x0000000000F47000-memory.dmpFilesize
28KB
-
memory/3360-22-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3360-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3872-64-0x000001F858D10000-0x000001F858D17000-memory.dmpFilesize
28KB
-
memory/3872-67-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3872-61-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4492-50-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/4492-44-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/4492-47-0x0000016EF61F0000-0x0000016EF61F7000-memory.dmpFilesize
28KB