Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
54af4213db5f39efc01549040d6bd451_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
54af4213db5f39efc01549040d6bd451_JaffaCakes118.dll
-
Size
994KB
-
MD5
54af4213db5f39efc01549040d6bd451
-
SHA1
0d8faf654805116aba476def35902b5c4f9ac363
-
SHA256
5af0a2900c62e7719bab11ff2e1b919266722b295b68e36c7112d036cc15afb5
-
SHA512
8e3608df45d882c57400e9f1497a8f9e9be57a519626ff72c28c40c7833c915beb5544b06f4b34217b3c0c0f7b2696bbf72ff78a7182a3e7247ee81055b57b4d
-
SSDEEP
24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3520-4-0x0000000002AF0000-0x0000000002AF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
quickassist.exemstsc.exeInfDefaultInstall.exepid process 2064 quickassist.exe 1280 mstsc.exe 4832 InfDefaultInstall.exe -
Loads dropped DLL 3 IoCs
Processes:
quickassist.exemstsc.exeInfDefaultInstall.exepid process 2064 quickassist.exe 1280 mstsc.exe 4832 InfDefaultInstall.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pruztwesow = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\AddIns\\lO5lK\\mstsc.exe" -
Processes:
rundll32.exequickassist.exemstsc.exeInfDefaultInstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA quickassist.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstsc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA InfDefaultInstall.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3520 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3520 wrote to memory of 1784 3520 quickassist.exe PID 3520 wrote to memory of 1784 3520 quickassist.exe PID 3520 wrote to memory of 2064 3520 quickassist.exe PID 3520 wrote to memory of 2064 3520 quickassist.exe PID 3520 wrote to memory of 1036 3520 mstsc.exe PID 3520 wrote to memory of 1036 3520 mstsc.exe PID 3520 wrote to memory of 1280 3520 mstsc.exe PID 3520 wrote to memory of 1280 3520 mstsc.exe PID 3520 wrote to memory of 3852 3520 InfDefaultInstall.exe PID 3520 wrote to memory of 3852 3520 InfDefaultInstall.exe PID 3520 wrote to memory of 4832 3520 InfDefaultInstall.exe PID 3520 wrote to memory of 4832 3520 InfDefaultInstall.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54af4213db5f39efc01549040d6bd451_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
C:\Windows\system32\quickassist.exeC:\Windows\system32\quickassist.exe1⤵PID:1784
-
C:\Users\Admin\AppData\Local\R1TzX\quickassist.exeC:\Users\Admin\AppData\Local\R1TzX\quickassist.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2064
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵PID:1036
-
C:\Users\Admin\AppData\Local\KkG\mstsc.exeC:\Users\Admin\AppData\Local\KkG\mstsc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1280
-
C:\Windows\system32\InfDefaultInstall.exeC:\Windows\system32\InfDefaultInstall.exe1⤵PID:3852
-
C:\Users\Admin\AppData\Local\oXQzSf\InfDefaultInstall.exeC:\Users\Admin\AppData\Local\oXQzSf\InfDefaultInstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
995KB
MD52da9d1b3f154a0be1a008948ba4debc3
SHA14bbc0319d7efed749e3aaf6f80be8c496f174ade
SHA2564e9da0b48bfbd0bd83ec5928e6796e3e990dac80691fb74dfeb4ea7c170d6bf1
SHA512582e1de093e858808ddbb88b4271fa0c8598d87cdc8e75d3c6549988b0592f2e29e1b69d0164baa433d21a8745e4819cd98a5347681f228404aca6401f36132c
-
Filesize
1.5MB
MD53a26640414cee37ff5b36154b1a0b261
SHA1e0c28b5fdf53a202a7543b67bbc97214bad490ed
SHA2561d1b6b2edac7ac6494c9eecda3afb804f679d7190f4d1a80929380e85743823f
SHA51276fc70ead57ddacd3dbcec1a4772bd46924d30b30018a36b13052d2f7272cc86b63bf85d5e4ec04aac08630d4b2637ca6e7d35c08ce6b675d63ed011f7d95ba2
-
Filesize
997KB
MD5212605a5773ae264665f43e9ca8cd404
SHA13563bafbeb07d2a17ce17e8c3f92b8d6c08f446e
SHA256aa8bfb2a0193e56e9ffccaec787dbccc33cd8eaee6407ad230bd53ef14e63f8c
SHA5124f361de52959750714b541f62e98f05b317556d28bf75641816edcbdb18dd8330427bcf1cb4363d6eb8989435ef932be213c6ae0915a10561e7c9c1c07ea07bc
-
Filesize
665KB
MD5d1216f9b9a64fd943539cc2b0ddfa439
SHA16fad9aeb7780bdfd88a9a5a73b35b3e843605e6c
SHA256c1e8fda00da574e8759ba262d76b6edc1d5f4a80620730ef0be7527e0d803db2
SHA512c5fd7d81d1d478056fcbed0ba887ce551832f0104e7c31753c3c8760b4d63f38324f74e996684042acc8f9682fce8a8c85172741a868257e87d5e0f988c4e567
-
Filesize
13KB
MD5ee18876c1e5de583de7547075975120e
SHA1f7fcb3d77da74deee25de9296a7c7335916504e3
SHA256e59127b5fe82714956c7a1f10392a8673086a8e1f609e059935c7da1fa015a5d
SHA51208bc4d28b8f528582c58175a74871dd33ac97955c3709c991779fc34b5ba4b2ba6ff40476d9f59345b61b0153fd932b0ea539431a67ff5012cb2ac8ab392f73c
-
Filesize
995KB
MD5ab1dfde67776a51534cca2ceeaba5454
SHA13544200b2e68d3d359ff057ca0da5efe5c534a6c
SHA25666baebd9334bfdabf76bdc634f44302a2937de3d8c7898c0c55a2e5bad2afca0
SHA512c05aff43b906f36d06893cc030d995528de81664fd9a07cf5e1fb2aca33d92d23ac7e9f8976ff29e1058508600c9779cdc4ea28afcfb44d3e1ae4a1ef6ee0843
-
Filesize
1KB
MD53cf99342a44780c0ff253d0cd6b5b473
SHA174ac7cc83dcc98fcd05f4d0cbdba6772b46f2aa6
SHA256dcbcdecc9df57b53ef867679896664797ae95123992f7e628a774be74121af54
SHA512d1351a183c0324a14515d879ad05740ca420582cb9e8b091887709e395643fdc155def56362d34e2181a25873d06c7106fe2c4357134eeb134e3a9e8808179a5