Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
48261eb1530a4239ebb56bb5bc9aa217_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
48261eb1530a4239ebb56bb5bc9aa217_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
48261eb1530a4239ebb56bb5bc9aa217
-
SHA1
cda82eb1ede80e356c15219eae4750b995cd2803
-
SHA256
7bf840ca70c270a4d2ffdfa43d0cdc99dbce46c021d3487cff99b7326dbf121d
-
SHA512
f0a98c79ddfa49e85ee1f69fcf8ef3eaefd76ae1c45b7a9e566e8da19263c9ece413c3367e6325b7604789668384acc28060d3e2f0fea92ed7992714f7c53fa4
-
SSDEEP
24576:BVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8K:BV8hf6STw1ZlQauvzSq01ICe6zvmV
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3420-4-0x0000000002570000-0x0000000002571000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wlrmdr.exemblctr.exeSppExtComObj.Exepid process 2708 wlrmdr.exe 812 mblctr.exe 3896 SppExtComObj.Exe -
Loads dropped DLL 3 IoCs
Processes:
wlrmdr.exemblctr.exeSppExtComObj.Exepid process 2708 wlrmdr.exe 812 mblctr.exe 3896 SppExtComObj.Exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pruztwesow = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~2\\LUA\\mblctr.exe" -
Processes:
SppExtComObj.Exerundll32.exewlrmdr.exemblctr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SppExtComObj.Exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wlrmdr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2064 rundll32.exe 2064 rundll32.exe 2064 rundll32.exe 2064 rundll32.exe 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3420 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3420 wrote to memory of 3840 3420 wlrmdr.exe PID 3420 wrote to memory of 3840 3420 wlrmdr.exe PID 3420 wrote to memory of 2708 3420 wlrmdr.exe PID 3420 wrote to memory of 2708 3420 wlrmdr.exe PID 3420 wrote to memory of 3444 3420 mblctr.exe PID 3420 wrote to memory of 3444 3420 mblctr.exe PID 3420 wrote to memory of 812 3420 mblctr.exe PID 3420 wrote to memory of 812 3420 mblctr.exe PID 3420 wrote to memory of 4124 3420 SppExtComObj.Exe PID 3420 wrote to memory of 4124 3420 SppExtComObj.Exe PID 3420 wrote to memory of 3896 3420 SppExtComObj.Exe PID 3420 wrote to memory of 3896 3420 SppExtComObj.Exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48261eb1530a4239ebb56bb5bc9aa217_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
C:\Windows\system32\wlrmdr.exeC:\Windows\system32\wlrmdr.exe1⤵PID:3840
-
C:\Users\Admin\AppData\Local\vSEc837tU\wlrmdr.exeC:\Users\Admin\AppData\Local\vSEc837tU\wlrmdr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2708
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:3444
-
C:\Users\Admin\AppData\Local\h2C\mblctr.exeC:\Users\Admin\AppData\Local\h2C\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:812
-
C:\Windows\system32\SppExtComObj.ExeC:\Windows\system32\SppExtComObj.Exe1⤵PID:4124
-
C:\Users\Admin\AppData\Local\Y58pMka\SppExtComObj.ExeC:\Users\Admin\AppData\Local\Y58pMka\SppExtComObj.Exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5570a1ef7a514e385707a0113f26882f4
SHA154ac9d41f654f6cc42326307ac836981a4371ca0
SHA25698027d643a15c31c1f5394da5ecfb71f49cfeb1bef2f5491e2d45bee627f95e0
SHA5121e73bfe3b3ebfda6f2f899807c922890674a621b4fc09842e63969278534ec28345623684fe4f97503aebcd931211fee19de8e259355d84499df75679a6ed9d6
-
Filesize
559KB
MD5728a78909aa69ca0e976e94482350700
SHA16508dfcbf37df25cae8ae68cf1fcd4b78084abb7
SHA2562a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c
SHA51222bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1
-
Filesize
1.2MB
MD5f65cfb756d1aba00927b918120befc4b
SHA182d01af041be09bddb7ba5065792cdf21b8e09ee
SHA2562fb2d1f13b8654b06ff1ca71639355fc5b964bbc90c1bebaf3172fb6fe2d1ce4
SHA5122184211e374de1396fdbf62adb735cb85d302432f45c58a783d2fb4b45ba96d616ae2ddf4964ba163f9066dc8eea5d4dd610e3cab10b6d89dffcd8e3ee6ece3a
-
Filesize
790KB
MD5d3db14eabb2679e08020bcd0c96fa9f6
SHA1578dca7aad29409634064579d269e61e1f07d9dd
SHA2563baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69
SHA51214dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe
-
Filesize
1.5MB
MD56eaa1e8f897a740e9faa8a5208818199
SHA1909bb7bae4995d80a1f2ed242dfa3e49e036c832
SHA256fafc50c94983b923182ae73c805d2848124fe6a46e0cf60d164b9463f04ba864
SHA51275933bcbe0ab87bf76cbd4da778b591f1c93308f79bbcaaa2d6472c9c411146db32843ad819c00086ca766f35e52caa61e935c8018a96799c9284e2f657aabf6
-
Filesize
66KB
MD5ef9bba7a637a11b224a90bf90a8943ac
SHA14747ec6efd2d41e049159249c2d888189bb33d1d
SHA2562fda95aafb2e9284c730bf912b93f60a75b151941adc14445ed1e056140325b1
SHA5124c1fdb8e4bf25546a2a33c95268593746f5ae2666ce36c6d9ba5833357f13720c4722231224e82308af8c156485a2c86ffd97e3093717a28d1300d3787ef1831
-
Filesize
1KB
MD5919c2094f42a6085c16c6882b965b75d
SHA1ac50a0b5c6b53d196443abca1c78e24bf4cfb091
SHA256f1274126f09a458435d224f2de5f1a409db473b5b23136697f602e6d6a2eaa71
SHA512c6207c3a721156a6dbf40fcc81627c3e3d66f58ae8c6296de5fedf56b83314d5893d78c05f5a9ba850e4a3b81e4fb7c0952f009677a4afd974f1e1141515cf0c