Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
88ddb49e0375d67f2af8e44d70096880_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
88ddb49e0375d67f2af8e44d70096880_JaffaCakes118.dll
-
Size
987KB
-
MD5
88ddb49e0375d67f2af8e44d70096880
-
SHA1
a2b8b6a7f7f3361f2a8180d6060dc6e8b6d3e2a2
-
SHA256
4b25b71b0279a338fc387043f74376f4d3d9b8151df7238b3c02b90fc9a69251
-
SHA512
df5bd61c1a39a83b3ab9ab6f9b49bc5109fb17d437ef97140ef576b6d742d3a28f2f3002a123f1e761f0c53a97e136b7ce573ae8135503ca34fcbad26f699053
-
SSDEEP
24576:sVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL89:sV8hf6STw1ZlQauvzSq01ICe6zvm6
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3544-4-0x0000000002ED0000-0x0000000002ED1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WFS.exepsr.exedxgiadaptercache.exepid process 2344 WFS.exe 648 psr.exe 3572 dxgiadaptercache.exe -
Loads dropped DLL 4 IoCs
Processes:
WFS.exepsr.exedxgiadaptercache.exepid process 2344 WFS.exe 648 psr.exe 648 psr.exe 3572 dxgiadaptercache.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Welddizcvtwl = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Templates\\2LsNmlxm\\psr.exe" -
Processes:
psr.exedxgiadaptercache.exerundll32.exeWFS.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dxgiadaptercache.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3544 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3544 wrote to memory of 1228 3544 WFS.exe PID 3544 wrote to memory of 1228 3544 WFS.exe PID 3544 wrote to memory of 2344 3544 WFS.exe PID 3544 wrote to memory of 2344 3544 WFS.exe PID 3544 wrote to memory of 468 3544 psr.exe PID 3544 wrote to memory of 468 3544 psr.exe PID 3544 wrote to memory of 648 3544 psr.exe PID 3544 wrote to memory of 648 3544 psr.exe PID 3544 wrote to memory of 2320 3544 dxgiadaptercache.exe PID 3544 wrote to memory of 2320 3544 dxgiadaptercache.exe PID 3544 wrote to memory of 3572 3544 dxgiadaptercache.exe PID 3544 wrote to memory of 3572 3544 dxgiadaptercache.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88ddb49e0375d67f2af8e44d70096880_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\425\WFS.exeC:\Users\Admin\AppData\Local\425\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\Q6ps\psr.exeC:\Users\Admin\AppData\Local\Q6ps\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dxgiadaptercache.exeC:\Windows\system32\dxgiadaptercache.exe1⤵
-
C:\Users\Admin\AppData\Local\2QAE\dxgiadaptercache.exeC:\Users\Admin\AppData\Local\2QAE\dxgiadaptercache.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\2QAE\dxgi.dllFilesize
988KB
MD58a08a2b995c60b08afdf24392e8f1cbc
SHA1c31ba950fa0baeaf7380fd11e0406e246ed30d0d
SHA256d293c4e3bcc7b96f28afa54a91e4b0ab1f289479d6600ec2094102e3678ddec7
SHA512f842096205345390f106d15a2521c2b1418c41bfe267e27507d5b1c83a1694bad4215035959365da532c3d128679fbb914541f691698fdbc4775a162610726c2
-
C:\Users\Admin\AppData\Local\2QAE\dxgiadaptercache.exeFilesize
230KB
MD5e62f89130b7253f7780a862ed9aff294
SHA1b031e64a36e93f95f2061be5b0383069efac2070
SHA2564bea9f741fe4ca9d6262477849896b9fa6377326d11af044561c31bde2d994b5
SHA51205649d38a0b5d825bb8442549427b0ff77b139c9dd297b04d6c0fb1415504c95ed750cd79efea2ff514abfc5d1003e6251a3cd871d352dcea06be0cdeb0304f7
-
C:\Users\Admin\AppData\Local\425\WFS.exeFilesize
944KB
MD53cbc8d0f65e3db6c76c119ed7c2ffd85
SHA1e74f794d86196e3bbb852522479946cceeed7e01
SHA256e23e4182efe7ed61aaf369696e1ce304c3818df33d1663872b6d3c75499d81f4
SHA51226ae5845a804b9eb752078f1ffa80a476648a8a9508b4f7ba56c94acd4198f3ba59c77add4feb7e0420070222af56521ca5f6334f466d5db272c816930513f0a
-
C:\Users\Admin\AppData\Local\425\credui.dllFilesize
988KB
MD5fe370dabf2f06750e1cec8dcd4b5a370
SHA16baaf27ebbf66f7e7ad8a736d4140408fb3d89b9
SHA2563d327276ca0ca5cc03451a68149117b7243345c946769173c1943ed576af2e27
SHA512456dd8b29e9378b870ea962799fa682fe4da190a71b8c23c9d6166facb0ad982a829c1309ebfd775ffcd1d842887104233fd959396b7da35ca8a8897c7852224
-
C:\Users\Admin\AppData\Local\Q6ps\VERSION.dllFilesize
988KB
MD555d4d1f94207358d888901ae8d64a337
SHA1827e8b50afd4439e42a2750b6b218cf10cbfa317
SHA256cf7f287e51ecd82896eb24f55f90a21fc9cd2bb170252da097f77501f303cc95
SHA512630b61759a58bd67883667c1331ff70611b98f67aa0c3a9ce00de50ddf6721e7cbf9a7962baa42f064b10375bb933c3d7ee78d1bb761279933b39fc38e39c483
-
C:\Users\Admin\AppData\Local\Q6ps\psr.exeFilesize
232KB
MD5ad53ead5379985081b7c3f1f357e545a
SHA16f5aa32c1d15fbf073558fadafd046d97b60184e
SHA2564f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f
SHA512433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Hjyomsugwtoazg.lnkFilesize
1KB
MD54bd2ca94a10959fd3f4f2de67fb3710e
SHA1ab917ccf596bee361a7a9a437dcff58820a8dd79
SHA256835b357b3ffcac2ba14f0dc18caad57991496dddb0c5bbf4255c3b34ea4f08a5
SHA512022e43fcfd4bc7c780f64462d0939e3e7556f00c9a080eedbfac938a989793601f84e3d20ceb8936258b9e0a55bdb33510d28331104e8d83d9675537711b1307
-
memory/648-68-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/648-62-0x0000018E91850000-0x0000018E91857000-memory.dmpFilesize
28KB
-
memory/2344-44-0x000002BB7D6B0000-0x000002BB7D6B7000-memory.dmpFilesize
28KB
-
memory/2344-45-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2344-50-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3544-32-0x0000000002C70000-0x0000000002C77000-memory.dmpFilesize
28KB
-
memory/3544-31-0x00007FFC44BCA000-0x00007FFC44BCB000-memory.dmpFilesize
4KB
-
memory/3544-6-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-4-0x0000000002ED0000-0x0000000002ED1000-memory.dmpFilesize
4KB
-
memory/3544-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-33-0x00007FFC459B0000-0x00007FFC459C0000-memory.dmpFilesize
64KB
-
memory/3544-22-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3544-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3572-82-0x00000265BB0E0000-0x00000265BB0E7000-memory.dmpFilesize
28KB
-
memory/3572-85-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4080-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4080-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4080-3-0x00000233A9170000-0x00000233A9177000-memory.dmpFilesize
28KB