Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
805cfbdf86f0b96d764ec4d94cf2360c_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
805cfbdf86f0b96d764ec4d94cf2360c_JaffaCakes118.dll
-
Size
987KB
-
MD5
805cfbdf86f0b96d764ec4d94cf2360c
-
SHA1
135e15ca1b80483e83e016dbcb11ba64dd289b7e
-
SHA256
976e368f1c88cbaa179d651e604ec02dc14db5548b5051c9a70de81b1c41a600
-
SHA512
992432c661273be9c0f7ad6e9568f5b892e8d6626c99347b31bb39f02e4acfe1bac47d63a7e20e8459e76840c26187c385bb6e1c88f350146e2bff6d1d3c6045
-
SSDEEP
24576:4VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:4V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3416-4-0x0000000008A50000-0x0000000008A51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
slui.exemblctr.exedccw.exepid process 4852 slui.exe 3784 mblctr.exe 3512 dccw.exe -
Loads dropped DLL 3 IoCs
Processes:
slui.exemblctr.exedccw.exepid process 4852 slui.exe 3784 mblctr.exe 3512 dccw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Welddizcvtwl = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\4jVNZQKh\\mblctr.exe" -
Processes:
dccw.exerundll32.exeslui.exemblctr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3456 rundll32.exe 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3416 3416 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3416 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3416 wrote to memory of 3004 3416 slui.exe PID 3416 wrote to memory of 3004 3416 slui.exe PID 3416 wrote to memory of 4852 3416 slui.exe PID 3416 wrote to memory of 4852 3416 slui.exe PID 3416 wrote to memory of 4972 3416 mblctr.exe PID 3416 wrote to memory of 4972 3416 mblctr.exe PID 3416 wrote to memory of 3784 3416 mblctr.exe PID 3416 wrote to memory of 3784 3416 mblctr.exe PID 3416 wrote to memory of 4588 3416 dccw.exe PID 3416 wrote to memory of 4588 3416 dccw.exe PID 3416 wrote to memory of 3512 3416 dccw.exe PID 3416 wrote to memory of 3512 3416 dccw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\805cfbdf86f0b96d764ec4d94cf2360c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵
-
C:\Users\Admin\AppData\Local\FOS\slui.exeC:\Users\Admin\AppData\Local\FOS\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵
-
C:\Users\Admin\AppData\Local\9yegC\mblctr.exeC:\Users\Admin\AppData\Local\9yegC\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵
-
C:\Users\Admin\AppData\Local\5tbJZq\dccw.exeC:\Users\Admin\AppData\Local\5tbJZq\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\5tbJZq\dccw.exeFilesize
101KB
MD5cb9374911bf5237179785c739a322c0f
SHA13f4d3dd3d58c9f19dfbb414ded16969ebd9f74b9
SHA256f7f3300b78148a34f6a35796c777a832b638b6d3193e11f4a37f45d4c6dfa845
SHA5129d47521538148b1823c0a17baa86ddf932f06f46d5d8b63fa87b2cc220fb98ce3f933e32d771222937bb8e41c88030839d489d1cd78b062bffeb2980dc6864be
-
C:\Users\Admin\AppData\Local\5tbJZq\mscms.dllFilesize
992KB
MD5dd2bb3428d9011e5e52b16638bfb6490
SHA165ac64b60519d369f2bc91525a70aec511202033
SHA2567e46f570af8392e3961e527700b4e0e7daff56f9a23f308c49dbdf8ae6c14e4b
SHA5123e18eb0c947ec8e6799dc2a38d4c62af880a84a792fa11f365dedfe780dbb5eb344e9ffa688ab9e5dec72d30afe09dfb84a9fccc7ba407cce6be116fa0b32aaf
-
C:\Users\Admin\AppData\Local\9yegC\WTSAPI32.dllFilesize
989KB
MD5e3eacb839a96034daf2f4782581da822
SHA1675dff15becea1bfe947d877fb4035763f2121c1
SHA256e9d5eb333e8893264b17de61c86b220c95dc6ee51ebf12e591dd510f00bb05d2
SHA512af093c2c67e282a98a258f0731f0b6797940fdc918a41f813f3c4bc9d36314e985c199077558d4873635c212f2bde091680c5164aea23b16b6a101fb91d30cc4
-
C:\Users\Admin\AppData\Local\9yegC\mblctr.exeFilesize
790KB
MD5d3db14eabb2679e08020bcd0c96fa9f6
SHA1578dca7aad29409634064579d269e61e1f07d9dd
SHA2563baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69
SHA51214dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe
-
C:\Users\Admin\AppData\Local\FOS\WINBRAND.dllFilesize
988KB
MD5e819d984ad5afddf1856c8d9677fe301
SHA1ae4dde87a5480a7acf82f496e93aa5bbd7e74fbf
SHA25693063c55c9c4962730ec4804b4e5d832aa2b1f3779b095504ae92a892dfb6a73
SHA512cd113ea8756da7a4dda2faac242129c23dfeea0898b84eb98014f456854951bf313398941ef2f7e16786223252062c51cf062cd9553a29e9866642fb63b7d029
-
C:\Users\Admin\AppData\Local\FOS\slui.exeFilesize
534KB
MD5eb725ea35a13dc18eac46aa81e7f2841
SHA1c0b3304c970324952e18c4a51073e3bdec73440b
SHA25625e7624d469a592934ab8c509d12c153c2799e604c2a4b8a83650a7268577dff
SHA51239192a1fad29654b3769f007298eff049d0688a3cb51390833ec563f44f9931cd3f6f8693db37b649b061b5aab379b166c15dade56d0fc414375243320375b26
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Hjyomsugwtoazg.lnkFilesize
1KB
MD5545defcac363b552485b395944b0c741
SHA17a12963e204f56f5c26be5ea2a503df054fb974e
SHA256faf01e9b741775c894c41988176882e1e9ee2344b308432da4ed6fdbab176b0c
SHA5122fd1016cca651b699e12a81da7599d1e103e2b7389aa1f29f6e925b0a54f195fed566ed703caa9c24daa47cf74f1ce6085486d39c8eb12df1285b87c97915514
-
memory/3416-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-32-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-36-0x00007FFA2D170000-0x00007FFA2D180000-memory.dmpFilesize
64KB
-
memory/3416-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-35-0x0000000007D00000-0x0000000007D07000-memory.dmpFilesize
28KB
-
memory/3416-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3416-4-0x0000000008A50000-0x0000000008A51000-memory.dmpFilesize
4KB
-
memory/3416-6-0x00007FFA2CF2A000-0x00007FFA2CF2B000-memory.dmpFilesize
4KB
-
memory/3456-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3456-2-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3456-0-0x000001F9FBCD0000-0x000001F9FBCD7000-memory.dmpFilesize
28KB
-
memory/3512-78-0x0000018E492F0000-0x0000018E492F7000-memory.dmpFilesize
28KB
-
memory/3512-79-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3512-84-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3784-64-0x000001F7C2000000-0x000001F7C2007000-memory.dmpFilesize
28KB
-
memory/3784-67-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4852-50-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4852-45-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4852-44-0x000002147B0E0000-0x000002147B0E7000-memory.dmpFilesize
28KB