Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
64ad7b6b4c821bc0f138e23a3ae8f98e_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
64ad7b6b4c821bc0f138e23a3ae8f98e_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
64ad7b6b4c821bc0f138e23a3ae8f98e
-
SHA1
ff738b1f5284c28bdb0a2d5223ac0d6f05a47c44
-
SHA256
4892d89738704f770fbfa938a4007eba643a13c62f68585489c950f12322f778
-
SHA512
22021b36d63b082c6c7931d32153b4bc1d57756b3c950cdfd61be659b6d0a3920c5bff65a295fe4014e9940b6467bc2f99aaab9f1fa4302bb10964440416a60b
-
SSDEEP
24576:lVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:lV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3516-4-0x0000000003190000-0x0000000003191000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1340 sppsvc.exe 4720 wbengine.exe 3928 sppsvc.exe -
Loads dropped DLL 3 IoCs
pid Process 1340 sppsvc.exe 4720 wbengine.exe 3928 sppsvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pruztwesow = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\l74\\wbengine.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sppsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sppsvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1564 rundll32.exe 1564 rundll32.exe 1564 rundll32.exe 1564 rundll32.exe 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3516 wrote to memory of 1340 3516 Process not Found 96 PID 3516 wrote to memory of 1340 3516 Process not Found 96 PID 3516 wrote to memory of 2340 3516 Process not Found 97 PID 3516 wrote to memory of 2340 3516 Process not Found 97 PID 3516 wrote to memory of 4720 3516 Process not Found 98 PID 3516 wrote to memory of 4720 3516 Process not Found 98 PID 3516 wrote to memory of 3928 3516 Process not Found 100 PID 3516 wrote to memory of 3928 3516 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64ad7b6b4c821bc0f138e23a3ae8f98e_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:1308
-
C:\Users\Admin\AppData\Local\5z2Z\sppsvc.exeC:\Users\Admin\AppData\Local\5z2Z\sppsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1340
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵PID:2340
-
C:\Users\Admin\AppData\Local\3xhOBki0e\wbengine.exeC:\Users\Admin\AppData\Local\3xhOBki0e\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4720
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:3112
-
C:\Users\Admin\AppData\Local\NQf\sppsvc.exeC:\Users\Admin\AppData\Local\NQf\sppsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51543ed89f9acdfbfdab94042664ec408
SHA1e22c62f65e185b6fa725da612c3c2360f83ec1fc
SHA256eaf84c67d9f56fe5c88f3a7e69581ffc4e5d8c629656b9376c9358d5534ff961
SHA51239694c27e6cb18cccac3abe984c934164d8f356ad94e216f65309a447edf4275fe34550383ffa5ab7bbdfdce639d6f4df98c6462e0c516ad6c8f20fd4574c15f
-
Filesize
1.5MB
MD517270a354a66590953c4aac1cf54e507
SHA1715babcc8e46b02ac498f4f06df7937904d9798d
SHA2569954394b43783061f9290706320cc65597c29176d5b8e7a26fa1d6b3536832b4
SHA5126be0ba6be84d01ab47f5a4ca98a6b940c43bd2d1e1a273d41c3e88aca47da11d932024b007716d1a6ffe6cee396b0e3e6971ab2afc293e72472f2e61c17b2a89
-
Filesize
1.2MB
MD5377f12f68b5618cfa497cd4ca425efbe
SHA10192c526e5e03ff546605e9519509a0be8ca63ea
SHA25602e0f1255aec389121ea89c42c563f6b560484fe5da606deb4c2dc078bec4a04
SHA51297aea90dd06beaeedf5bcf2df76ae41f778fbd3adcb5408739dbc94e7d1d42e3ab40871446fe9e6ff66bd5b5274a018b41d21bfc083db2bc58d7cc44cbc530cb
-
Filesize
4.4MB
MD5ec6cef0a81f167668e18fa32f1606fce
SHA16d56837a388ae5573a38a439cee16e6dde5b4de8
SHA25682c59a2f606ebf1a8a0de16be150600ac63ad8351c6bf3952c27a70257cb70f8
SHA512f40b37675329ca7875d958b4b0019082548a563ada217c7431c2ca5c7f93957b242f095f7f04bcdd6240b97ea99e89bfe3a003f97c43366d00a93768fef7b4c5
-
Filesize
1.2MB
MD5d9e55f16afe6290bce369d7ad4c0663c
SHA1fd1d97293c14da41a0da29b2111e36274925832a
SHA2560b8f76c1994f6927714f8d8361e0e4b01313834e07c556b220effa2a019a52af
SHA512234b93d88e79cd84799064100c00faeabd6984cda16b2a5487ab531bd70662ba8e440c6736e2efb54a2e25bb2f39e776dfc835b3641903a6dc368a883d8a37e0
-
Filesize
1KB
MD508d9434ab438889fdef0355e15e5d805
SHA1034c71f0b3f87ffa413e46355ac96c063433760f
SHA2565330b7ff458b8e11525845c9379e8dc4af2b243ab172740f7fbfcac75b324417
SHA5120959c9f36bddfa05156a719669c64554a4735023acbbeab9b417e51a7d98d7efcfeeac1acbfef32a2eaeb2ecf8d155c5390a77dd8bb14924ce4abff599296a84