Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
6d29291670d613e73991f0ddb06f428c_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
6d29291670d613e73991f0ddb06f428c_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
6d29291670d613e73991f0ddb06f428c
-
SHA1
19706380dcc284baf80bc7f38ed2b04db059d6f3
-
SHA256
578c92f464be0b7adac38b2599735835b874fb81bed5394ffa65d572facf4ed5
-
SHA512
292c88c08fce72512f0dc8efb961657356b8987310307338748bb4597cf8e828de60eaf8e6e730d2df7c294e593af5112402c571eff1579a18bf2393b2625d6b
-
SSDEEP
24576:xVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8/:xV8hf6STw1ZlQauvzSq01ICe6zvmc
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3436-4-0x0000000002D90000-0x0000000002D91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
CloudNotifications.exeGamePanel.exetcmsetup.exepid process 2600 CloudNotifications.exe 2328 GamePanel.exe 4408 tcmsetup.exe -
Loads dropped DLL 3 IoCs
Processes:
CloudNotifications.exeGamePanel.exetcmsetup.exepid process 2600 CloudNotifications.exe 2328 GamePanel.exe 4408 tcmsetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eeaxmqtu = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\FWj25qsK6\\GamePanel.exe" -
Processes:
rundll32.exeCloudNotifications.exeGamePanel.exetcmsetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2856 rundll32.exe 2856 rundll32.exe 2856 rundll32.exe 2856 rundll32.exe 2856 rundll32.exe 2856 rundll32.exe 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3436 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3436 wrote to memory of 4884 3436 CloudNotifications.exe PID 3436 wrote to memory of 4884 3436 CloudNotifications.exe PID 3436 wrote to memory of 2600 3436 CloudNotifications.exe PID 3436 wrote to memory of 2600 3436 CloudNotifications.exe PID 3436 wrote to memory of 4680 3436 GamePanel.exe PID 3436 wrote to memory of 4680 3436 GamePanel.exe PID 3436 wrote to memory of 2328 3436 GamePanel.exe PID 3436 wrote to memory of 2328 3436 GamePanel.exe PID 3436 wrote to memory of 4296 3436 tcmsetup.exe PID 3436 wrote to memory of 4296 3436 tcmsetup.exe PID 3436 wrote to memory of 4408 3436 tcmsetup.exe PID 3436 wrote to memory of 4408 3436 tcmsetup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d29291670d613e73991f0ddb06f428c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵
-
C:\Users\Admin\AppData\Local\UoYJl\CloudNotifications.exeC:\Users\Admin\AppData\Local\UoYJl\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵
-
C:\Users\Admin\AppData\Local\ODSA\GamePanel.exeC:\Users\Admin\AppData\Local\ODSA\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵
-
C:\Users\Admin\AppData\Local\wPd\tcmsetup.exeC:\Users\Admin\AppData\Local\wPd\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ODSA\GamePanel.exeFilesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
C:\Users\Admin\AppData\Local\ODSA\dwmapi.dllFilesize
1.2MB
MD5d622a0fc8db8943a6b9d009f414228d7
SHA1029a0cdd8a4d7ce21605743ca36d191d656a2823
SHA25663754a17f4fe84ac06a8892c89fd325741202815b17e5b8bba6658499a4e0e25
SHA5124f339c30d64d98b5d49c1b7cf3a5d9fd2b0d1716c3c9d503495a783f3635d004578f5c6f9c92e3b09b157f5ff1421cc4d37d5f8b5c7f42645278aa41198090f2
-
C:\Users\Admin\AppData\Local\UoYJl\CloudNotifications.exeFilesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
C:\Users\Admin\AppData\Local\UoYJl\UxTheme.dllFilesize
1.2MB
MD5b090bf801d7662b86b54499435ae7e4a
SHA15c7c05eaffcba13728d2104a5a4ebd7cd1a4e7fe
SHA2562657bb18dd4ccc33ee98f0b5cfec5b2b9d5f34b3b2d77ddc4c2e0958a1fe78ef
SHA512083f778ab15672865f2586da2e8e31a94b4de85d44e26fb6610214812d8257037d84586b0d4da15e5156900d6cb97a93398d09ec5c36b68e05d2dd37b7571104
-
C:\Users\Admin\AppData\Local\wPd\TAPI32.dllFilesize
1.2MB
MD514189a7dcb2610a09aff74996c94c85d
SHA11ffb541fda0b7afe9ddcd5df2bca591ed191cce1
SHA256ab1527deff5d14d6b16b877d0740f7b73279a699e119ce3fff93ed210416b149
SHA5126312e6d70d7c3363dd8a2011ed10bafef26fd17ee037749e809cf3894471bca9db60d81584e46ba792eac3684be95b5de8729c2e4f74a03cfc45820cada4ce46
-
C:\Users\Admin\AppData\Local\wPd\tcmsetup.exeFilesize
16KB
MD558f3b915b9ae7d63431772c2616b0945
SHA16346e837da3b0f551becb7cac6d160e3063696e9
SHA256e243501ba2ef7a6f04f51410bb916faffe0ec23450a4d030ce6bfe747e544b39
SHA5127b09192af460c502d1a94989a0d06191c8c7a058ce3a4541e3f45960a1e12529d0cdaff9da3d5bacfdceed57aeb6dc9a159c6c0a95675c438f99bf7e418c6dc5
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Rkjap.lnkFilesize
1KB
MD5b8623bd21e48fca410acee1b59d31cc7
SHA126a92865a55c74027f4dd96ee1618430cffdccbc
SHA256fea389052722980428a6cdd8aadecf7ca07d8d6aa9a0c9ca50b1a8a8a4717057
SHA512634c61fcc2c8e309c83787930f81054bcdf3332451c0053bbd6918f84c4a7ef36914f165e50703fc95ccb8a9064d70b6edd3a2bd7bf5fa7065d97b24fba98e84
-
memory/2328-69-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2328-66-0x0000026E04850000-0x0000026E04857000-memory.dmpFilesize
28KB
-
memory/2600-52-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2600-47-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2600-46-0x00000145445B0000-0x00000145445B7000-memory.dmpFilesize
28KB
-
memory/2856-0-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2856-39-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2856-3-0x00000225078B0000-0x00000225078B7000-memory.dmpFilesize
28KB
-
memory/3436-33-0x0000000000B40000-0x0000000000B47000-memory.dmpFilesize
28KB
-
memory/3436-32-0x00007FFAACD1A000-0x00007FFAACD1B000-memory.dmpFilesize
4KB
-
memory/3436-14-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-7-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-8-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-9-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-10-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-11-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-12-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-24-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-34-0x00007FFAAD270000-0x00007FFAAD280000-memory.dmpFilesize
64KB
-
memory/3436-36-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-15-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-13-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-6-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3436-4-0x0000000002D90000-0x0000000002D91000-memory.dmpFilesize
4KB
-
memory/4408-85-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/4408-80-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB