Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
791ccdb6ee9aec99c283d3aa5abaf42c_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
791ccdb6ee9aec99c283d3aa5abaf42c_JaffaCakes118.dll
-
Size
990KB
-
MD5
791ccdb6ee9aec99c283d3aa5abaf42c
-
SHA1
aa96e92baa5a5fc4cfb9963bebd1c32ed0b1969b
-
SHA256
61d82c261caf4346ce16385a69192ff356f9bb1455d34802d362f6efdfc199e1
-
SHA512
55b4a90eeec621f460b46f91ce478d22f7d9808f2c8e7f18cc89a9af77ee3173a176f3b6e6538a7618b52e74a0879615db9fd54209ff8b584e0884256d8f64db
-
SSDEEP
24576:SVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:SV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3576-4-0x0000000002830000-0x0000000002831000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WFS.exemfpmp.exeSystemPropertiesPerformance.exepid process 4408 WFS.exe 2280 mfpmp.exe 1360 SystemPropertiesPerformance.exe -
Loads dropped DLL 3 IoCs
Processes:
WFS.exemfpmp.exeSystemPropertiesPerformance.exepid process 4408 WFS.exe 2280 mfpmp.exe 1360 SystemPropertiesPerformance.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Hkwligutpbxhkv = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\sY\\mfpmp.exe" -
Processes:
rundll32.exeWFS.exemfpmp.exeSystemPropertiesPerformance.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2880 rundll32.exe 2880 rundll32.exe 2880 rundll32.exe 2880 rundll32.exe 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 3576 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3576 wrote to memory of 4904 3576 WFS.exe PID 3576 wrote to memory of 4904 3576 WFS.exe PID 3576 wrote to memory of 4408 3576 WFS.exe PID 3576 wrote to memory of 4408 3576 WFS.exe PID 3576 wrote to memory of 4948 3576 mfpmp.exe PID 3576 wrote to memory of 4948 3576 mfpmp.exe PID 3576 wrote to memory of 2280 3576 mfpmp.exe PID 3576 wrote to memory of 2280 3576 mfpmp.exe PID 3576 wrote to memory of 4952 3576 SystemPropertiesPerformance.exe PID 3576 wrote to memory of 4952 3576 SystemPropertiesPerformance.exe PID 3576 wrote to memory of 1360 3576 SystemPropertiesPerformance.exe PID 3576 wrote to memory of 1360 3576 SystemPropertiesPerformance.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\791ccdb6ee9aec99c283d3aa5abaf42c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\seQn\WFS.exeC:\Users\Admin\AppData\Local\seQn\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵
-
C:\Users\Admin\AppData\Local\mP7Ve\mfpmp.exeC:\Users\Admin\AppData\Local\mP7Ve\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵
-
C:\Users\Admin\AppData\Local\uWB\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\uWB\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\mP7Ve\MFPlat.DLLFilesize
998KB
MD56c182c264967690b432a53607372a215
SHA1a5482e423c098a96a7e96199ae5be5914786ae1c
SHA256c46d20f2c72f569d02236f73bdf5404dfca28c1d179aaf7d4d3679ab2f1223b0
SHA512ad509ea9b9443e840ffc78f6723e070bd7839d1207a8cd7c1da4f87bf1713aa7cf08e4adaf2183a56355da903ae7acfa8def031950afa08c4ba0ee2212b8e11e
-
C:\Users\Admin\AppData\Local\mP7Ve\mfpmp.exeFilesize
46KB
MD58f8fd1988973bac0c5244431473b96a5
SHA1ce81ea37260d7cafe27612606cf044921ad1304c
SHA25627287ac874cef86be03aee7b6d34fdc3bd208070ed20e44621a305865fb7579e
SHA512a91179e1561168b3b58f5ca893bce425d35f4a02aec20ac3d6fb944f5eb3c06b0a1b9d9f3fb9ea87869d65671d2b89b4ae19acf794372bdbd27f5e9756c5a8ab
-
C:\Users\Admin\AppData\Local\seQn\WFS.exeFilesize
944KB
MD53cbc8d0f65e3db6c76c119ed7c2ffd85
SHA1e74f794d86196e3bbb852522479946cceeed7e01
SHA256e23e4182efe7ed61aaf369696e1ce304c3818df33d1663872b6d3c75499d81f4
SHA51226ae5845a804b9eb752078f1ffa80a476648a8a9508b4f7ba56c94acd4198f3ba59c77add4feb7e0420070222af56521ca5f6334f466d5db272c816930513f0a
-
C:\Users\Admin\AppData\Local\seQn\WINMM.dllFilesize
995KB
MD53d36b83d5450c4429c8b14bf825b5bff
SHA1d16eae3de8f4c4e5cef5e1f7e20ba934eb10a06c
SHA25609c7516ff804cf7579d9350cc3b5e1ad115868d64f087488b4cd841b170e9677
SHA512f3db27353daf84252c32a6388f696d42c4bda95096b197c6aaefccc795324db9af836ec3b2ba2dee178fe35b9ac8358a33fe6b626d586e8e707ad46d9d9a2546
-
C:\Users\Admin\AppData\Local\uWB\SYSDM.CPLFilesize
990KB
MD5d7bca383f97bcf39c33e591285f38e89
SHA17882d07b9c272bc3943fec34b0bb7517a91e8356
SHA256240a5af8db226396b40a0dd50d3798811e22c30152c8a7c6d88cc713b8aaffad
SHA51212010fe5fa11f55743d8ebdf942572d3cdf5ae74370e0d4cc7d105c0d1878083cd732ff9810bac8fabc503711909a397a7450aa6f61ad6809f9a79748eedba65
-
C:\Users\Admin\AppData\Local\uWB\SystemPropertiesPerformance.exeFilesize
82KB
MD5e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1adbfa782b7998720fa85678cc85863b961975e28
SHA256b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
SHA512c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Zgbuverbplpthj.lnkFilesize
1KB
MD5438a23acbcd050fc3265d4dd9083d162
SHA1a25603b2e45b5aa1efd8c880ee110de68613c5a1
SHA256b66262ccddc2cb8d04fb8a6f94dd33b5b4b2728308c8245808f465713160e2fc
SHA5126c423a709faffe29c8530521ef2f202eebf8da0ec5fb89e48c17830a763814718e3c64dad0e467bdf2491d94648af9435334c61de5d253f063889dd80140c2f3
-
memory/1360-84-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1360-78-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1360-81-0x000001A8F0AB0000-0x000001A8F0AB7000-memory.dmpFilesize
28KB
-
memory/2280-67-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2280-61-0x000001F5377A0000-0x000001F5377A7000-memory.dmpFilesize
28KB
-
memory/2880-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2880-0-0x000001FDBCC00000-0x000001FDBCC07000-memory.dmpFilesize
28KB
-
memory/2880-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-32-0x0000000000C20000-0x0000000000C27000-memory.dmpFilesize
28KB
-
memory/3576-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-4-0x0000000002830000-0x0000000002831000-memory.dmpFilesize
4KB
-
memory/3576-6-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-31-0x00007FF92016A000-0x00007FF92016B000-memory.dmpFilesize
4KB
-
memory/3576-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-33-0x00007FF9218D0000-0x00007FF9218E0000-memory.dmpFilesize
64KB
-
memory/3576-22-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3576-34-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4408-50-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/4408-47-0x0000012C8F600000-0x0000012C8F607000-memory.dmpFilesize
28KB
-
memory/4408-44-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB