Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
ad83edd17de18486efe22dc738daeae5_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
ad83edd17de18486efe22dc738daeae5_JaffaCakes118.dll
-
Size
990KB
-
MD5
ad83edd17de18486efe22dc738daeae5
-
SHA1
d02937cc07297a06bd372334a4b01cf19f34740a
-
SHA256
58a7b50c5201c447d6259a1dcd04e0f0d54ad73cf5a4a9cbe7bc2d7eb1ca8887
-
SHA512
9aa535f0ada29522f228732ea1808d60e3a819d4172ba6f704e3d893f655deb2cfd245d9738259dba6ec86fe56fbbbedcc59ed4e7db09d4a1c01b4f9a5a64b9d
-
SSDEEP
24576:SVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:SV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3484-4-0x00000000026B0000-0x00000000026B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
osk.exeLockScreenContentServer.exemsinfo32.exepid process 1940 osk.exe 4980 LockScreenContentServer.exe 3820 msinfo32.exe -
Loads dropped DLL 3 IoCs
Processes:
osk.exeLockScreenContentServer.exemsinfo32.exepid process 1940 osk.exe 4980 LockScreenContentServer.exe 3820 msinfo32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tyoytnnsf = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\7Yzt\\LOCKSC~1.EXE" -
Processes:
osk.exeLockScreenContentServer.exemsinfo32.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LockScreenContentServer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1508 rundll32.exe 1508 rundll32.exe 1508 rundll32.exe 1508 rundll32.exe 1508 rundll32.exe 1508 rundll32.exe 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3484 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3484 wrote to memory of 3620 3484 osk.exe PID 3484 wrote to memory of 3620 3484 osk.exe PID 3484 wrote to memory of 1940 3484 osk.exe PID 3484 wrote to memory of 1940 3484 osk.exe PID 3484 wrote to memory of 4564 3484 LockScreenContentServer.exe PID 3484 wrote to memory of 4564 3484 LockScreenContentServer.exe PID 3484 wrote to memory of 4980 3484 LockScreenContentServer.exe PID 3484 wrote to memory of 4980 3484 LockScreenContentServer.exe PID 3484 wrote to memory of 3788 3484 msinfo32.exe PID 3484 wrote to memory of 3788 3484 msinfo32.exe PID 3484 wrote to memory of 3820 3484 msinfo32.exe PID 3484 wrote to memory of 3820 3484 msinfo32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad83edd17de18486efe22dc738daeae5_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵
-
C:\Users\Admin\AppData\Local\8SSW8fOO\osk.exeC:\Users\Admin\AppData\Local\8SSW8fOO\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\LockScreenContentServer.exeC:\Windows\system32\LockScreenContentServer.exe1⤵
-
C:\Users\Admin\AppData\Local\zhsA63ohS\LockScreenContentServer.exeC:\Users\Admin\AppData\Local\zhsA63ohS\LockScreenContentServer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵
-
C:\Users\Admin\AppData\Local\M5rKZxh\msinfo32.exeC:\Users\Admin\AppData\Local\M5rKZxh\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8SSW8fOO\DUser.dllFilesize
995KB
MD544ebee56e5ccd2e3c3c2aa2822539711
SHA194fc4e5c84e451562d3006cc6cf4d55d38c75d1e
SHA2568bb682001825d71a4763e6ef9db10e5e9e3fb0c7e043d68e15b54ca43b27818a
SHA5122ab5cd7d6bba87019b413f7a6e618713a2463ef8dd0daab3ca55f661714f1439915840db87e2e8a2122ed36468ec1c7c3a1398fe0f23dad72f869fe2e1f4b21b
-
C:\Users\Admin\AppData\Local\8SSW8fOO\osk.exeFilesize
638KB
MD5745f2df5beed97b8c751df83938cb418
SHA12f9fc33b1bf28e0f14fd75646a7b427ddbe14d25
SHA256f67ef6e31fa0eaed44bfbab5b908be06b56cbc7d5a16ab2a72334d91f2bb6a51
SHA5122125d021e6f45a81bd75c9129f4b098ad9aa15c25d270051f4da42458a9737bff44d6adf17aa1f2547715d159fb621829f7cd3b9d42f1521c919549cc7deb228
-
C:\Users\Admin\AppData\Local\M5rKZxh\MFC42u.dllFilesize
1018KB
MD506d8e013a18115c69e417b0f883747cd
SHA13e508e0e5881f4bd56a57d8ec888c4736d974342
SHA256c369c0d455a6e012a3ed56786044a6723d05c91b1b73790ceaee444db86cc968
SHA512cd5f18d71822b7cf7ef4eebe56541008990710fb5d3b608d7e5426ce7d4e5e9e306b6cec532fb38c862bd5cb59fb2933e14b34c646c8a2b6e5469c1fa3270aca
-
C:\Users\Admin\AppData\Local\M5rKZxh\msinfo32.exeFilesize
376KB
MD50aed91da63713bf9f881b03a604a1c9d
SHA1b1b2d292cb1a4c13dc243b5eab13afb316a28b9a
SHA2565cf1604d2473661266e08fc0e4e144ea98f99b7584c43585eb2b01551130fd14
SHA51204bca9b321d702122b6e72c2ad15b7cd98924e5dfc3b8dd0e907ea28fd7826d3f72b98c67242b6698594df648d3c2b6b0952bb52a2363b687bbe44a66e830c03
-
C:\Users\Admin\AppData\Local\zhsA63ohS\DUI70.dllFilesize
1.2MB
MD5a2bc246e02e25832e28bd529ce995cc7
SHA171670d7d1c4b585440f4bda939b362e0dea3ec73
SHA2560912985259dcc3986d485d3ab5475953167bb963f857216ea0d7d569a0ce9327
SHA512b2079d1f4a823d9b9d4783a01a99183d38d4ed3442bc001be34eb7f83b9a086c20cc1d0cd4d63139db47583b69ed1084a3124a18dbe6a8a1a51227df9f46d2ec
-
C:\Users\Admin\AppData\Local\zhsA63ohS\LockScreenContentServer.exeFilesize
47KB
MD5a0b7513c98cf46ca2cea3a567fec137c
SHA12307fc8e3fc620ea3c2fdc6248ad4658479ba995
SHA256cb2278884f04fd34753f7a20e5865ef5fc4fa47c28df9ac14ad6e922713af8c6
SHA5123928485a60ffa7f2d2b7d0be51863e1f8197578cfb397f1086a1ab5132843a23bbc4042b04b5d01fafad04878bd839161fa492d0cf1a6bac6be92023cdee3d15
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Fotgztfwispj.lnkFilesize
1KB
MD5eea5bc734aa35916c1a6538ae49a988b
SHA13b7712bda45e190b9f9793d41d4e9dcdbeb233ae
SHA25687b3a175a755c7a6f8295a0769c5e3dfe03f29497e21940f23688ecb4b43b95e
SHA512b1ee31c3c3477001cae6617606a4493746dc723ebb639595f197121a42f86315fab2db7b8350f99d584956b39b0a247c6711c22acf5332da47e43998cc251b6c
-
memory/1508-38-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1508-1-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1508-3-0x000002A6CC070000-0x000002A6CC077000-memory.dmpFilesize
28KB
-
memory/1940-49-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/1940-48-0x00000267F95F0000-0x00000267F95F7000-memory.dmpFilesize
28KB
-
memory/1940-45-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/3484-35-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-26-0x00007FFBA108A000-0x00007FFBA108B000-memory.dmpFilesize
4KB
-
memory/3484-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-6-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-23-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-14-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-27-0x0000000000970000-0x0000000000977000-memory.dmpFilesize
28KB
-
memory/3484-28-0x00007FFBA12B0000-0x00007FFBA12C0000-memory.dmpFilesize
64KB
-
memory/3484-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-4-0x00000000026B0000-0x00000000026B1000-memory.dmpFilesize
4KB
-
memory/3484-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3484-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3820-79-0x0000000140000000-0x0000000140104000-memory.dmpFilesize
1.0MB
-
memory/3820-82-0x0000024BD4E00000-0x0000024BD4E07000-memory.dmpFilesize
28KB
-
memory/3820-85-0x0000000140000000-0x0000000140104000-memory.dmpFilesize
1.0MB
-
memory/4980-68-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/4980-65-0x000002247BE10000-0x000002247BE17000-memory.dmpFilesize
28KB
-
memory/4980-62-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB