Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
52ab939a75757880e9bfc35fd2fa2576_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
52ab939a75757880e9bfc35fd2fa2576_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
52ab939a75757880e9bfc35fd2fa2576
-
SHA1
3f2653d7e6126b092d0dde6b762771f69fc53bce
-
SHA256
7ecf07ac53b189273246a924e5dfec00f279ef61109ef416a064ceae4363a03b
-
SHA512
e977a0e211fd2080da59b8402f3871e260c6bb5972834116086719b61ef246a3ea7057f9561df03ada1e478f55799e77adf510774610d78f3e42d6ce9159a1c9
-
SSDEEP
24576:oVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8y:oV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3508-4-0x00000000009C0000-0x00000000009C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
phoneactivate.exeMagnify.exeApplicationFrameHost.exepid process 2460 phoneactivate.exe 4088 Magnify.exe 4528 ApplicationFrameHost.exe -
Loads dropped DLL 3 IoCs
Processes:
phoneactivate.exeMagnify.exeApplicationFrameHost.exepid process 2460 phoneactivate.exe 4088 Magnify.exe 4528 ApplicationFrameHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pruztwesow = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Proof\\KU3s\\Magnify.exe" -
Processes:
rundll32.exephoneactivate.exeMagnify.exeApplicationFrameHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplicationFrameHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1396 rundll32.exe 1396 rundll32.exe 1396 rundll32.exe 1396 rundll32.exe 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3508 wrote to memory of 4972 3508 phoneactivate.exe PID 3508 wrote to memory of 4972 3508 phoneactivate.exe PID 3508 wrote to memory of 2460 3508 phoneactivate.exe PID 3508 wrote to memory of 2460 3508 phoneactivate.exe PID 3508 wrote to memory of 3244 3508 Magnify.exe PID 3508 wrote to memory of 3244 3508 Magnify.exe PID 3508 wrote to memory of 4088 3508 Magnify.exe PID 3508 wrote to memory of 4088 3508 Magnify.exe PID 3508 wrote to memory of 3832 3508 ApplicationFrameHost.exe PID 3508 wrote to memory of 3832 3508 ApplicationFrameHost.exe PID 3508 wrote to memory of 4528 3508 ApplicationFrameHost.exe PID 3508 wrote to memory of 4528 3508 ApplicationFrameHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52ab939a75757880e9bfc35fd2fa2576_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵PID:4972
-
C:\Users\Admin\AppData\Local\o26q0Be\phoneactivate.exeC:\Users\Admin\AppData\Local\o26q0Be\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2460
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:3244
-
C:\Users\Admin\AppData\Local\H518ClO2j\Magnify.exeC:\Users\Admin\AppData\Local\H518ClO2j\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4088
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe1⤵PID:3832
-
C:\Users\Admin\AppData\Local\joiflTg1r\ApplicationFrameHost.exeC:\Users\Admin\AppData\Local\joiflTg1r\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
1.4MB
MD5a9f2ae88a79ec467262849a84a9ce330
SHA1b79186d690af85c68c10a5cd5acf50ae79948a2e
SHA256ccdb80341ac831350d2833a8305760bdae98acbb90b7f30fbc9c43b7b2db569e
SHA512f6a9696160b823a7da865def27fc6b77971cec8ceac0e0bdf4bd242b0200e53014a885674a0bee79c473ee892b6e4b4eab0273688f3dbdb61e24fad7f1850a82
-
Filesize
76KB
MD5d58a8a987a8dafad9dc32a548cc061e7
SHA1f79fc9e0ab066cad530b949c2153c532a5223156
SHA256cf58e424b86775e6f2354291052126a646f842fff811b730714dfbbd8ebc71a4
SHA51293df28b65af23a5f82124ba644e821614e2e2074c98dbb2bd7319d1dfe9e2179b9d660d7720913c79a8e7b2f8560440789ad5e170b9d94670589885060c14265
-
Filesize
1.4MB
MD58dbb5362a0b5ddd9fee3c49453c5c627
SHA132274f75f40bae6afbde2ba5b4e8dad1bd46f0b9
SHA256c7af8fb1ef6307261244f94c73d8477fd49f98d16fd553d0b4286c36205586c0
SHA512d186d7c10ee5e28d2923cde387fd9be5dd72153815c68514a0d006079c1b5b525dd7ea78ec5b8443dc0586871e77f45da3bea925c0681bc9d122d100855e14f8
-
Filesize
1.7MB
MD5121344aeb8ad8ba5c6f1e5c27a0c2e5a
SHA1e1ad156eacdc27f03056b973baff95bc70f38b4e
SHA256d83e6ff3076e745f736cf116801d6e70d016acc0e07497b6e1e86b0c2cc95a18
SHA512c60f9e1318e172f5ff22538b78a64399c4ab755498e046d70bb7f9534ba61d8cd6d2619ad83751111b485518f2666fa4cd619560c03e53274fa98917d9c4284b
-
Filesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
Filesize
1KB
MD5058ddd5fd36a2cea663267acb7602808
SHA1380ac058e68e5bd762539fb3b9189845034dddb9
SHA25614f11cc31d3c02e67949ff2ea40a9b1f5a565038d86bb537aeca0b2acdbb0b00
SHA5121d4ff8b10ad1fa7a7ad345646943145df05a9b6f37e83d728f5d0463341f2c667d1181ee9a910240716e04d8d88628c6e698ebdd81271096332529b55cceab9f