Analysis
-
max time kernel
149s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
90d39f9ec98db742751322a9a5548598_JaffaCakes118.dll
Resource
win7-20240215-en
General
-
Target
90d39f9ec98db742751322a9a5548598_JaffaCakes118.dll
-
Size
994KB
-
MD5
90d39f9ec98db742751322a9a5548598
-
SHA1
b952239166fce6b42c30fd9225d67e404593f9a7
-
SHA256
059d1b17a6ca578711f0f2cd12a71b4d9349fbbb0e4ab273c29ef464aa776354
-
SHA512
edb620dbe08ab02d95d60b7fc9cc925c7e6e04f98d159120a2178ad07d65646571e5ebabac60f06cac963ade15ae5126958963c3f9852f211e0fb94891f847c9
-
SSDEEP
24576:zVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:zV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3412-4-0x0000000003170000-0x0000000003171000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
sessionmsg.exeSysResetErr.exesessionmsg.exepid process 540 sessionmsg.exe 3592 SysResetErr.exe 2556 sessionmsg.exe -
Loads dropped DLL 3 IoCs
Processes:
sessionmsg.exeSysResetErr.exesessionmsg.exepid process 540 sessionmsg.exe 3592 SysResetErr.exe 2556 sessionmsg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pruztwesow = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\NETWOR~1\\a0ZMrX\\SYSRES~1.EXE" -
Processes:
rundll32.exesessionmsg.exeSysResetErr.exesessionmsg.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 3412 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3412 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3412 wrote to memory of 508 3412 sessionmsg.exe PID 3412 wrote to memory of 508 3412 sessionmsg.exe PID 3412 wrote to memory of 540 3412 sessionmsg.exe PID 3412 wrote to memory of 540 3412 sessionmsg.exe PID 3412 wrote to memory of 3364 3412 SysResetErr.exe PID 3412 wrote to memory of 3364 3412 SysResetErr.exe PID 3412 wrote to memory of 3592 3412 SysResetErr.exe PID 3412 wrote to memory of 3592 3412 SysResetErr.exe PID 3412 wrote to memory of 4980 3412 sessionmsg.exe PID 3412 wrote to memory of 4980 3412 sessionmsg.exe PID 3412 wrote to memory of 2556 3412 sessionmsg.exe PID 3412 wrote to memory of 2556 3412 sessionmsg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90d39f9ec98db742751322a9a5548598_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵
-
C:\Users\Admin\AppData\Local\CHPfXbuB8\sessionmsg.exeC:\Users\Admin\AppData\Local\CHPfXbuB8\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵
-
C:\Users\Admin\AppData\Local\iQxtZz9hp\SysResetErr.exeC:\Users\Admin\AppData\Local\iQxtZz9hp\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵
-
C:\Users\Admin\AppData\Local\SjZE2\sessionmsg.exeC:\Users\Admin\AppData\Local\SjZE2\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\CHPfXbuB8\DUI70.dllFilesize
1.2MB
MD54248a660d028071272b7438169245d27
SHA14375f384363fdb3f9e1fac3275d4ad80a2c65463
SHA2567628f6223e5ef727c9ec03d9747fd721ba637ffd48b2a3346179ece555655951
SHA512e562b6ea709d9f7a1af2e5d6e0b5784c1c891dad2685b11a84f9864311c09768146b98b46ffaa6af79b9e4b6c58960d509973fc782bf3285c55d37784d7ff661
-
C:\Users\Admin\AppData\Local\CHPfXbuB8\sessionmsg.exeFilesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
C:\Users\Admin\AppData\Local\SjZE2\DUI70.dllFilesize
1.2MB
MD54a9298a938f748d48aa2694ae7ea159f
SHA1f20d101d835242e1d27a74dceebb50a8c2668e17
SHA2563d18c84f226605089c39c869998df33cc4e363e8b5b1eab7e67bd4fcaa8645f1
SHA512bdf5cd6975f915f6b2e3563aa2c2273c5d7e7235aa304d731a2ee408c3e8c4a4bb18ce0d071f7175077f598b2cb326076f5b6f53fe21c77e6e62873546d86407
-
C:\Users\Admin\AppData\Local\iQxtZz9hp\DUI70.dllFilesize
1.2MB
MD502d38035ad724d35b0a5dbefaeb85c24
SHA186edd692bab1acc771d2788e8d06e353b820ffe2
SHA256ed6e2f7c5b69e9280445b10a50065049f1c92408cdc2e1d457329deafac48552
SHA5126ff7e7ee3a3dda1ded731343c2cb6ed86b21cedb3beffb8462ddd33c5f2157110d5c7c1caf7cb06aa30a6b281de948bbe181a0ac8a2bf3044fc90628f72c7717
-
C:\Users\Admin\AppData\Local\iQxtZz9hp\SysResetErr.exeFilesize
41KB
MD5090c6f458d61b7ddbdcfa54e761b8b57
SHA1c5a93e9d6eca4c3842156cc0262933b334113864
SHA256a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd
SHA512c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Arcabpqqvo.lnkFilesize
1KB
MD514d7e88c112bcce45a6f73b66d3959b1
SHA13c448a78170cf5b59468d0786f9a152d8195df9d
SHA256102d5ddf161f4fc91d70e070f4c3a03233e47c24a6723fb8385b48fde51c8a15
SHA512c8319e6eaac3494698aec6fd1157a8b168e77ceccc31910084f4cdf7980256661eae23c25f6a5570904c03b7cf90aeb93ab54156e9b857f24f230d7e4a870259
-
memory/540-51-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/540-45-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/540-48-0x00000277481C0000-0x00000277481C7000-memory.dmpFilesize
28KB
-
memory/2556-85-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2556-82-0x0000024763480000-0x0000024763487000-memory.dmpFilesize
28KB
-
memory/3412-36-0x0000000001180000-0x0000000001187000-memory.dmpFilesize
28KB
-
memory/3412-35-0x00007FFADDECA000-0x00007FFADDECB000-memory.dmpFilesize
4KB
-
memory/3412-14-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-8-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-7-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-6-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-4-0x0000000003170000-0x0000000003171000-memory.dmpFilesize
4KB
-
memory/3412-10-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-11-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-9-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-32-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-12-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-37-0x00007FFADEF10000-0x00007FFADEF20000-memory.dmpFilesize
64KB
-
memory/3412-23-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3412-13-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3592-68-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/3592-62-0x00000285226C0000-0x00000285226C7000-memory.dmpFilesize
28KB
-
memory/4964-1-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/4964-38-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/4964-3-0x00000182E6AD0000-0x00000182E6AD7000-memory.dmpFilesize
28KB