Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
25d810dc0c2458141f99fc9e784a2906_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
25d810dc0c2458141f99fc9e784a2906_JaffaCakes118.dll
-
Size
987KB
-
MD5
25d810dc0c2458141f99fc9e784a2906
-
SHA1
69fdff77d5a20cc2bc1aab7ded817adb5196aff2
-
SHA256
04c81016fa21625303306f3574fc1294105ef223c7dc498510819681eedd52f5
-
SHA512
666b0a3f3f6594e49e79c858961828f501ffb6514b2b403e48d908a2f7d47729c97864fb844b1b71727b434ef787178d9ee4d8eb3ec7a5a531f24f3e75831a05
-
SSDEEP
24576:6VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8ct:6V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3544-4-0x00000000027F0000-0x00000000027F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DevicePairingWizard.exerdpinput.exeomadmclient.exepid process 4664 DevicePairingWizard.exe 3248 rdpinput.exe 2340 omadmclient.exe -
Loads dropped DLL 3 IoCs
Processes:
DevicePairingWizard.exerdpinput.exeomadmclient.exepid process 4664 DevicePairingWizard.exe 3248 rdpinput.exe 2340 omadmclient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Hkwligutpbxhkv = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\PRINTE~1\\cD\\rdpinput.exe" -
Processes:
omadmclient.exerundll32.exeDevicePairingWizard.exerdpinput.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA omadmclient.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 468 rundll32.exe 468 rundll32.exe 468 rundll32.exe 468 rundll32.exe 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3544 wrote to memory of 2932 3544 DevicePairingWizard.exe PID 3544 wrote to memory of 2932 3544 DevicePairingWizard.exe PID 3544 wrote to memory of 4664 3544 DevicePairingWizard.exe PID 3544 wrote to memory of 4664 3544 DevicePairingWizard.exe PID 3544 wrote to memory of 1556 3544 rdpinput.exe PID 3544 wrote to memory of 1556 3544 rdpinput.exe PID 3544 wrote to memory of 3248 3544 rdpinput.exe PID 3544 wrote to memory of 3248 3544 rdpinput.exe PID 3544 wrote to memory of 4832 3544 omadmclient.exe PID 3544 wrote to memory of 4832 3544 omadmclient.exe PID 3544 wrote to memory of 2340 3544 omadmclient.exe PID 3544 wrote to memory of 2340 3544 omadmclient.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25d810dc0c2458141f99fc9e784a2906_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\AvsdQPj\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\AvsdQPj\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵
-
C:\Users\Admin\AppData\Local\SOr5\rdpinput.exeC:\Users\Admin\AppData\Local\SOr5\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\omadmclient.exeC:\Windows\system32\omadmclient.exe1⤵
-
C:\Users\Admin\AppData\Local\wxE\omadmclient.exeC:\Users\Admin\AppData\Local\wxE\omadmclient.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\AvsdQPj\DevicePairingWizard.exeFilesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
C:\Users\Admin\AppData\Local\AvsdQPj\MFC42u.dllFilesize
1014KB
MD55f08396c27b4fe0f1054beaf8b300869
SHA10b46b631f2686d052fbd2ddb0187b0d10ed73ced
SHA256234174f18a557c94f124ab389099e1e30a8d75ce1baea0576aad68a3f4d6e086
SHA5124485d541decf3a4223db57ea1052a0b5043dfd612263daf5f75fa1b2447152bd911e97af160bf9c44f71dfae6e65589508a14f0e8d93f7944069e973408b5886
-
C:\Users\Admin\AppData\Local\SOr5\WINSTA.dllFilesize
994KB
MD5f3b4cc82edda2a7f53390e37df4218d5
SHA1d6ff6d02780fc4ffa45ee96ae49c83eaeb0ab747
SHA256fc14ba66a7c80e55a3859a37bd5b2ee15942d1318b7da93431dbd50465a69600
SHA5123b642781e558a43dd80760fafba610cd9a26b484f92f437be268d5c3e91e6fcd6b535c6fb2e17f4ab2578311606523a9dee47c9b5a2fd91279d26b2bfbde0092
-
C:\Users\Admin\AppData\Local\SOr5\rdpinput.exeFilesize
180KB
MD5bd99eeca92869f9a3084d689f335c734
SHA1a2839f6038ea50a4456cd5c2a3ea003e7b77688c
SHA25639bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143
SHA512355433c3bbbaa3bcb849633d45713d8a7ac6f87a025732fbe83e259ec3a0cb4eabb18239df26609453f9fc6764c7276c5d0472f11cf12d15ef806aa7594d090e
-
C:\Users\Admin\AppData\Local\wxE\XmlLite.dllFilesize
987KB
MD520aed44f0163efd3080b516dba2d1756
SHA129164485a934d82ec4cb1de45c49286a40f72136
SHA256aa4739f53ab212b4c96fa45509653c032885836801261d4745a4bd6a0a2cb732
SHA512bd9140f11d15acc9432bb9ecc89922185f1529631a101b25348c4c587f90520897e73b89cc375707267d6cb7f0bfc15c5a24fe3e81128940de5cecef24ab4f5c
-
C:\Users\Admin\AppData\Local\wxE\omadmclient.exeFilesize
425KB
MD58992b5b28a996eb83761dafb24959ab4
SHA1697ecb33b8ff5b0e73ef29ce471153b368b1b729
SHA256e0c6c1b082c5d61be95b7fad95155b7cb2e516d6dcd51b8e1554a176876699e7
SHA5124ab0d71f6f9e5a5d0870d8e6eaa4b5db74ea6148de0a00603e3e56303d0fec4722172e0207b9678a5bd0136f2d43d43b9d34907183369ab3b9b9c1484034fe3d
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Zgbuverbplpthj.lnkFilesize
1KB
MD5b2aa1dd65c1d98f1d26d0679cb83bda1
SHA103b36f934b5eb2253317a26371932da5a3ea63c9
SHA25610f4915f0829bffd7227c9fdd9374850682ba866776f54df9040793ccbe9d926
SHA51277ddd5e9eb48960bc7a0b087e503f5f9d373339a7ea4e32cb479004ffbfe87ce1161ce540149390c1cdacd259d31b67e84ccc62aca4dbb7dc8ff28ea655d4798
-
memory/468-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/468-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/468-3-0x00000280227E0000-0x00000280227E7000-memory.dmpFilesize
28KB
-
memory/2340-81-0x000001E358BF0000-0x000001E358BF7000-memory.dmpFilesize
28KB
-
memory/2340-84-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2340-78-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3248-64-0x00000246F1F00000-0x00000246F1F07000-memory.dmpFilesize
28KB
-
memory/3248-67-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3248-61-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3544-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-6-0x00007FFA1D6DA000-0x00007FFA1D6DB000-memory.dmpFilesize
4KB
-
memory/3544-4-0x00000000027F0000-0x00000000027F1000-memory.dmpFilesize
4KB
-
memory/3544-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-32-0x0000000000630000-0x0000000000637000-memory.dmpFilesize
28KB
-
memory/3544-34-0x00007FFA1DB50000-0x00007FFA1DB60000-memory.dmpFilesize
64KB
-
memory/3544-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-33-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4664-50-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/4664-45-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/4664-44-0x0000021A33570000-0x0000021A33577000-memory.dmpFilesize
28KB