Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
2a3eadb5b49e55c1d57f5fea6961bb2e_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
2a3eadb5b49e55c1d57f5fea6961bb2e_JaffaCakes118.dll
-
Size
993KB
-
MD5
2a3eadb5b49e55c1d57f5fea6961bb2e
-
SHA1
de9bedff2a89a1668e5eb6054170522f5a373ba8
-
SHA256
74cd2d4fa0961ef49cd9c03e280ba2b224d948f51f7c56d75592771ff1585cf6
-
SHA512
beb1d186d80c5edce4f9c4db3ce524dc69724ecea929912c4bbfa85adda23e93538bba6fd66473f425d3868817e795287476c33d726064f1da2fc407561c28fa
-
SSDEEP
24576:rVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:rV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3456-4-0x0000000003040000-0x0000000003041000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
mstsc.exeiexpress.exeSysResetErr.exepid process 4820 mstsc.exe 4980 iexpress.exe 2056 SysResetErr.exe -
Loads dropped DLL 3 IoCs
Processes:
mstsc.exeiexpress.exeSysResetErr.exepid process 4820 mstsc.exe 4980 iexpress.exe 2056 SysResetErr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bhelxfhv = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\yNXd\\iexpress.exe" -
Processes:
rundll32.exemstsc.exeiexpress.exeSysResetErr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstsc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3456 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3456 wrote to memory of 4356 3456 mstsc.exe PID 3456 wrote to memory of 4356 3456 mstsc.exe PID 3456 wrote to memory of 4820 3456 mstsc.exe PID 3456 wrote to memory of 4820 3456 mstsc.exe PID 3456 wrote to memory of 2320 3456 iexpress.exe PID 3456 wrote to memory of 2320 3456 iexpress.exe PID 3456 wrote to memory of 4980 3456 iexpress.exe PID 3456 wrote to memory of 4980 3456 iexpress.exe PID 3456 wrote to memory of 1952 3456 SysResetErr.exe PID 3456 wrote to memory of 1952 3456 SysResetErr.exe PID 3456 wrote to memory of 2056 3456 SysResetErr.exe PID 3456 wrote to memory of 2056 3456 SysResetErr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a3eadb5b49e55c1d57f5fea6961bb2e_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵
-
C:\Users\Admin\AppData\Local\2e3rl8\mstsc.exeC:\Users\Admin\AppData\Local\2e3rl8\mstsc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵
-
C:\Users\Admin\AppData\Local\P5fg\iexpress.exeC:\Users\Admin\AppData\Local\P5fg\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵
-
C:\Users\Admin\AppData\Local\aPLaHgbq\SysResetErr.exeC:\Users\Admin\AppData\Local\aPLaHgbq\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\2e3rl8\Secur32.dllFilesize
996KB
MD53b13cc60883eb8512e95506cdfbd726b
SHA166398d319d54df61e5a42ff5c2e7bbf98110f882
SHA256fb8cdfb14fb2e1e648da15f28f8728208253744ef538ab36f5724086928d11f2
SHA512f70e72622c7a7731bb09a1363bdd5003763c3a8c660fa9b68a1e07213f3b5c2460b9af8b2cb595a401b18ac7cfc88785cb474ff5ab89be01e5a5b72c963d71c7
-
C:\Users\Admin\AppData\Local\2e3rl8\mstsc.exeFilesize
1.5MB
MD53a26640414cee37ff5b36154b1a0b261
SHA1e0c28b5fdf53a202a7543b67bbc97214bad490ed
SHA2561d1b6b2edac7ac6494c9eecda3afb804f679d7190f4d1a80929380e85743823f
SHA51276fc70ead57ddacd3dbcec1a4772bd46924d30b30018a36b13052d2f7272cc86b63bf85d5e4ec04aac08630d4b2637ca6e7d35c08ce6b675d63ed011f7d95ba2
-
C:\Users\Admin\AppData\Local\P5fg\VERSION.dllFilesize
994KB
MD5e2920c555f27c86ef1d0daaa8a392fc2
SHA186cf5230814d7fd53df77349ecb2d15af62f3228
SHA256a0ee8de475deca2d9783fdc9b8f116a99b6cbc7e16c94ecde853d8859ed2053b
SHA512ca165a84cdd4778eec719de362c7059f9c6638adcec8ffc1f4eac660abf426c9fc4177ba115f93f26f7512335bbe88c6d932994f8a8e319b1fb2690233f38237
-
C:\Users\Admin\AppData\Local\P5fg\iexpress.exeFilesize
166KB
MD517b93a43e25d821d01af40ba6babcc8c
SHA197c978d78056d995f751dfef1388d7cce4cc404a
SHA256d070b79fa254c528babb73d607a7a8fd53db89795d751f42fc0a283b61a76fd3
SHA5126b5743b37a3be8ae9ee2ab84e0749c32c60544298a7cce396470aa40bbd13f2e838d5d98159f21d500d20817c51ebce4b1d2f554e3e05f6c7fc97bc9d70ea391
-
C:\Users\Admin\AppData\Local\aPLaHgbq\DUI70.dllFilesize
1.2MB
MD5a1114d8861054765595db80e2a6e6590
SHA166c8559aac826ed285d1c581c1a48ab80811150b
SHA2562b56abb5b689bd9f371db8753c7fd9d1d4daff07450c84c160d6ba31f1b7772a
SHA512404afa0e23825524b3f65f9810e1f8d75d7b2c064d5f628e49c02c2a877722af18054e51099163ed16b39801e9fb0edb6ede86f95d9016ad12dd6fcdb90dbf73
-
C:\Users\Admin\AppData\Local\aPLaHgbq\SysResetErr.exeFilesize
41KB
MD5090c6f458d61b7ddbdcfa54e761b8b57
SHA1c5a93e9d6eca4c3842156cc0262933b334113864
SHA256a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd
SHA512c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Oabtankaq.lnkFilesize
1KB
MD56665c319f068d069a0d0f00e98ed4fa8
SHA11db3448f9e3bd1627017b951fab5a8c156689561
SHA2563649b0072f824c1a355609138e0b16af093dd7bf8f0c26fe00d98bb839f556a9
SHA512fc4d5dde31ef0e05243cac3b9abc90440f75242ed238f0abe7e8a15d6de0781e86d9f4b81bca0d68dfedb79565c41d906d8a711bee37fb1e0da1f84a9873467e
-
memory/2056-78-0x000002A74A350000-0x000002A74A357000-memory.dmpFilesize
28KB
-
memory/2056-79-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2056-84-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3052-37-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3052-0-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3052-3-0x000001D76AFE0000-0x000001D76AFE7000-memory.dmpFilesize
28KB
-
memory/3456-34-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-26-0x00007FF8EB27A000-0x00007FF8EB27B000-memory.dmpFilesize
4KB
-
memory/3456-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-4-0x0000000003040000-0x0000000003041000-memory.dmpFilesize
4KB
-
memory/3456-6-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-27-0x00000000011F0000-0x00000000011F7000-memory.dmpFilesize
28KB
-
memory/3456-22-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3456-28-0x00007FF8ECC10000-0x00007FF8ECC20000-memory.dmpFilesize
64KB
-
memory/3456-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4820-50-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/4820-44-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/4820-47-0x000002BCA5670000-0x000002BCA5677000-memory.dmpFilesize
28KB
-
memory/4980-67-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/4980-64-0x000002C29BA00000-0x000002C29BA07000-memory.dmpFilesize
28KB