Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
2bff80f70ad0151ec6bebe69e0bfb972_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
2bff80f70ad0151ec6bebe69e0bfb972_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
2bff80f70ad0151ec6bebe69e0bfb972
-
SHA1
bd6f81939f482411bad7030994e6724092db7d5c
-
SHA256
e75bb6327d366e83dd2f2e52c662343ef76dd47b5eb53ae2cc8cb27f047ed7cc
-
SHA512
f29a1232faadd2e064dc5ec77ac2fad95e0050191a753bd24fb40e95146fec09cb890348d911fe33e788e3ae9ebb18dca63802efad76cf6fab06fc7b7a7e2245
-
SSDEEP
24576:RVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:RV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3504-4-0x0000000002EA0000-0x0000000002EA1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
mblctr.exeNetplwiz.exedwm.exepid process 3076 mblctr.exe 4768 Netplwiz.exe 3148 dwm.exe -
Loads dropped DLL 6 IoCs
Processes:
mblctr.exeNetplwiz.exedwm.exepid process 3076 mblctr.exe 4768 Netplwiz.exe 3148 dwm.exe 3148 dwm.exe 3148 dwm.exe 3148 dwm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eeaxmqtu = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\67nNHum\\Netplwiz.exe" -
Processes:
dwm.exerundll32.exemblctr.exeNetplwiz.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 116 rundll32.exe 116 rundll32.exe 116 rundll32.exe 116 rundll32.exe 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3504 wrote to memory of 4720 3504 mblctr.exe PID 3504 wrote to memory of 4720 3504 mblctr.exe PID 3504 wrote to memory of 3076 3504 mblctr.exe PID 3504 wrote to memory of 3076 3504 mblctr.exe PID 3504 wrote to memory of 1520 3504 Netplwiz.exe PID 3504 wrote to memory of 1520 3504 Netplwiz.exe PID 3504 wrote to memory of 4768 3504 Netplwiz.exe PID 3504 wrote to memory of 4768 3504 Netplwiz.exe PID 3504 wrote to memory of 4400 3504 dwm.exe PID 3504 wrote to memory of 4400 3504 dwm.exe PID 3504 wrote to memory of 3148 3504 dwm.exe PID 3504 wrote to memory of 3148 3504 dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2bff80f70ad0151ec6bebe69e0bfb972_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:116
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:4720
-
C:\Users\Admin\AppData\Local\PBbEkzo9r\mblctr.exeC:\Users\Admin\AppData\Local\PBbEkzo9r\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3076
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:1520
-
C:\Users\Admin\AppData\Local\rTi7h6R\Netplwiz.exeC:\Users\Admin\AppData\Local\rTi7h6R\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4768
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:4400
-
C:\Users\Admin\AppData\Local\4Ip3NU\dwm.exeC:\Users\Admin\AppData\Local\4Ip3NU\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55c27608411832c5b39ba04e33d53536c
SHA1f92f8b7439ce1de4c297046ed1d3ff9f20bc97af
SHA2560ac827c9e35cdaa492ddd435079415805dcc276352112b040bcd34ef122cf565
SHA5121fa25eabc08dff9ea25dfa7da310a677927c6344b76815696b0483f8860fa1469820ff15d88a78ed32f712d03003631d9aceaf9c9851de5dd40c1fc2a7bc1309
-
Filesize
1.2MB
MD5e32e4f1cb2b361ae0f45e50b91f0f8d6
SHA132676ce7f5e441f1a6d0d21599790e1bf1ff4cce
SHA256bae065cfc93c22c4321e5ba7011d58b153ce30fff19c00fa173391de0f453d35
SHA5128f50081250b52bf8251c060ebd58c2f342a9bae11a546418608af0a591aab419a81b77c4ce84a935d5b4040d7304125b4bf0ee02213b0b794dd5cad8ba448890
-
Filesize
1.2MB
MD5c3f395cc249790fc46363e157eca8358
SHA159f1e6135043e1e2b701ff80ab765767cd3c0113
SHA2564a0db34234e532383ee4c2a6525531a94a90e803a9d1a396e78683b1fe5afbfe
SHA512f4d9297a12324786ad56017daecdbc9540ae1d2de8fe4f600596d678b4edf42345f9686c61e865066a35c47bf58795806d950c67fe9cc5b229e2ebc7dcb9085f
-
Filesize
790KB
MD5d3db14eabb2679e08020bcd0c96fa9f6
SHA1578dca7aad29409634064579d269e61e1f07d9dd
SHA2563baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69
SHA51214dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe
-
Filesize
1.2MB
MD5928c8b0ca9ce185d611444b4e6d52f91
SHA108d12ef0dad0bdfaaa2a0b5d628aa25a9acdbba0
SHA2565505a38b28f451574853dea8ecff977bb57233224e86cebdc762e0e903b01cb8
SHA512d58eca5dc36682bd3ae23bb7e0a8efecd6c6614f3e8970e4e840ab861dce681319c75678c53585f2564cccf8daf52f17d1cb7dfb30c377349f24467bd448af9c
-
Filesize
40KB
MD5520a7b7065dcb406d7eca847b81fd4ec
SHA1d1b3b046a456630f65d482ff856c71dfd2f335c8
SHA2568323b44b6e69f02356a5ab0d03a4fc87b953edcbd85c2b6281bf92bc0a3b224d
SHA5127aea2810f38d1640d4aa87efbbe20783fe7b8e7f588864a3a384a37c91108d906abd89b235672608c98c46ed76db2b0039462098a1064ebe4108ec37b6087914
-
Filesize
1KB
MD598cfa05fef3174c8fd7b522b5716bbc4
SHA1c49044a3a9c20113cf420723feff66398eaa4f39
SHA256010f99d711293c25803d73e525d3d1cdf33a48ad6b9a088cc9048765a28e49f7
SHA512ee60612fc12feda53b72868fc13c719b71c06e577a89255ddad34bd596df9e82e30a0707a9ef5cca3de87963a1c749ef6da2a1b2f06e396dea672644d0eb6367