Analysis
-
max time kernel
149s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
7ecdae8ff4ce7a29e1cc131d4ff098b0_JaffaCakes118.dll
Resource
win7-20240215-en
General
-
Target
7ecdae8ff4ce7a29e1cc131d4ff098b0_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
7ecdae8ff4ce7a29e1cc131d4ff098b0
-
SHA1
883913c06a7e5867ecadaa6c5943c2875066e9e1
-
SHA256
f85f26d71c527e7078122cfaee013e2881573630fdcfc8dcde64a24698824105
-
SHA512
7930e981d2eda7b6f9c2a76d1861ec65cbcf897b086f456296a9ea1d3979da2b432cace42dd9b3b24a23669df598566bb4e189c3c4956205658d6ceaf23278ee
-
SSDEEP
24576:iVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:iV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3540-4-0x0000000007160000-0x0000000007161000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
raserver.exeDevicePairingWizard.exeeudcedit.exepid process 3720 raserver.exe 1964 DevicePairingWizard.exe 1872 eudcedit.exe -
Loads dropped DLL 3 IoCs
Processes:
raserver.exeDevicePairingWizard.exeeudcedit.exepid process 3720 raserver.exe 1964 DevicePairingWizard.exe 1872 eudcedit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iphtcfjrejti = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Vault\\Z0ZQ\\DevicePairingWizard.exe" -
Processes:
rundll32.exeraserver.exeDevicePairingWizard.exeeudcedit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4876 rundll32.exe 4876 rundll32.exe 4876 rundll32.exe 4876 rundll32.exe 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3540 Token: SeCreatePagefilePrivilege 3540 Token: SeShutdownPrivilege 3540 Token: SeCreatePagefilePrivilege 3540 Token: SeShutdownPrivilege 3540 Token: SeCreatePagefilePrivilege 3540 Token: SeShutdownPrivilege 3540 Token: SeCreatePagefilePrivilege 3540 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3540 3540 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3540 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3540 wrote to memory of 3356 3540 raserver.exe PID 3540 wrote to memory of 3356 3540 raserver.exe PID 3540 wrote to memory of 3720 3540 raserver.exe PID 3540 wrote to memory of 3720 3540 raserver.exe PID 3540 wrote to memory of 4264 3540 DevicePairingWizard.exe PID 3540 wrote to memory of 4264 3540 DevicePairingWizard.exe PID 3540 wrote to memory of 1964 3540 DevicePairingWizard.exe PID 3540 wrote to memory of 1964 3540 DevicePairingWizard.exe PID 3540 wrote to memory of 384 3540 eudcedit.exe PID 3540 wrote to memory of 384 3540 eudcedit.exe PID 3540 wrote to memory of 1872 3540 eudcedit.exe PID 3540 wrote to memory of 1872 3540 eudcedit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ecdae8ff4ce7a29e1cc131d4ff098b0_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:3356
-
C:\Users\Admin\AppData\Local\7G42t\raserver.exeC:\Users\Admin\AppData\Local\7G42t\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3720
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:4264
-
C:\Users\Admin\AppData\Local\1YWfOA7TK\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\1YWfOA7TK\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1964
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:384
-
C:\Users\Admin\AppData\Local\nArMXYZj\eudcedit.exeC:\Users\Admin\AppData\Local\nArMXYZj\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
Filesize
1.3MB
MD521f0619fdfd83a1defb6c0d83b59a4de
SHA1630591493a6150f89f7db784ec5473dd6049bc1a
SHA25602abda118a58adb2af04e940c09a7aaeb10d9da56bf8a991758b2936d27361a1
SHA512c2f41d10a3d39db6e71112f1e322dc28b5824ef66fbfe90caadd92f8a2eebd0df2ebc4e04ee62b12fec261802cb8d9d193d1f51697dd049edf98874b26af7a0b
-
Filesize
1.2MB
MD5da40014b35028fd9ddb50d237e14e821
SHA17db1483d37a9a5f21ac82847066cd37ca67dbd2b
SHA256c00678a376f35cb4f108a434c1d796d8805f5cb89488d60ac0ce6ea80b3aa071
SHA512a367c69a4e0a9228ce21aa5c56f3ca9c4f4199a661e9af07d9b37cbc5ecdf8331a99f47c0f5bd021c026a70cab7473ffc2744133cb431b6bb3c33b33436693bf
-
Filesize
132KB
MD5d1841c6ee4ea45794ced131d4b68b60e
SHA14be6d2116060d7c723ac2d0b5504efe23198ea01
SHA25638732626242988cc5b8f97fe8d3b030d483046ef66ea90d7ea3607f1adc0600d
SHA512d8bad215872c5956c6e8acac1cd3ad19b85f72b224b068fb71cfd1493705bc7d3390853ba923a1aa461140294f8793247df018484a378e4f026c2a12cb3fa5c9
-
Filesize
1.3MB
MD51b25d3fe0b5f6e351e029ef8cb53c8ad
SHA140f19de2ede1b14f8f7d2a6f4385e062268f6df4
SHA25601ab0f6b6e9df0b44eed93bbd7d8760c47251bf14117ea9d59057d068bb984f5
SHA51216f191ce1c9b5e3f0e7554c19c7ccc750bdaf30997009cf624eb6da77f99addb895dd20532c1d23cfff630b21ae900c2b0b6fb9372b02c6474e44026c6615570
-
Filesize
365KB
MD5a9de6557179d371938fbe52511b551ce
SHA1def460b4028788ded82dc55c36cb0df28599fd5f
SHA25683c8d1a7582b24b4bbc0d453c813487185c2b05c483bd1759ef647a7e7e92dfe
SHA5125790cac8dae16a785b48f790e6645b137f211c1587fb64ea88e743b846ff3a886324afcfef4bebc61f869023b9a22ba925c461dfb2e12497b70f501e6b79153c
-
Filesize
1KB
MD56923dae806af9ee9933ee367189f6093
SHA12629f422426a60cbee0abfec5901b9097e265ef2
SHA256af53587da77d9481a3be0e15c8caf0f35f86963af9f4eae4af66195470327ce5
SHA512ba3835986fe6402635b0c897ab59bb13f564aa0aece85d5cf259933057c77fee4fa78763304c71d47024149544314faf436f95ee890389adc0c68ff4123bd17f