Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
b701e2b9d6cd0a2dcc4bf110bdcd5e65_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
b701e2b9d6cd0a2dcc4bf110bdcd5e65_JaffaCakes118.dll
-
Size
990KB
-
MD5
b701e2b9d6cd0a2dcc4bf110bdcd5e65
-
SHA1
93d31fc474daf3963b0664e3fadb47432469177d
-
SHA256
11a95688e0ad5924bea8664e03a8ed114d16fc06323819e26e8481cb19bbae95
-
SHA512
ac33c85628afaea0cf2f62829b0fe007004398176c4c42b9a19fdf9cef3441f106f292f83243871d91bae9127ce803cf0730ce70f110fbdb63dbc6ba712ecf50
-
SSDEEP
24576:vVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8Lt:vV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3540-4-0x0000000003190000-0x0000000003191000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
PresentationSettings.exesessionmsg.exeomadmclient.exepid process 3532 PresentationSettings.exe 2692 sessionmsg.exe 3876 omadmclient.exe -
Loads dropped DLL 3 IoCs
Processes:
PresentationSettings.exesessionmsg.exeomadmclient.exepid process 3532 PresentationSettings.exe 2692 sessionmsg.exe 3876 omadmclient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rnerhfezerqab = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\AccountPictures\\Dozz\\sessionmsg.exe" -
Processes:
omadmclient.exerundll32.exePresentationSettings.exesessionmsg.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA omadmclient.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5088 rundll32.exe 5088 rundll32.exe 5088 rundll32.exe 5088 rundll32.exe 5088 rundll32.exe 5088 rundll32.exe 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3540 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3540 wrote to memory of 1240 3540 PresentationSettings.exe PID 3540 wrote to memory of 1240 3540 PresentationSettings.exe PID 3540 wrote to memory of 3532 3540 PresentationSettings.exe PID 3540 wrote to memory of 3532 3540 PresentationSettings.exe PID 3540 wrote to memory of 3804 3540 sessionmsg.exe PID 3540 wrote to memory of 3804 3540 sessionmsg.exe PID 3540 wrote to memory of 2692 3540 sessionmsg.exe PID 3540 wrote to memory of 2692 3540 sessionmsg.exe PID 3540 wrote to memory of 4848 3540 omadmclient.exe PID 3540 wrote to memory of 4848 3540 omadmclient.exe PID 3540 wrote to memory of 3876 3540 omadmclient.exe PID 3540 wrote to memory of 3876 3540 omadmclient.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b701e2b9d6cd0a2dcc4bf110bdcd5e65_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵PID:1240
-
C:\Users\Admin\AppData\Local\DQDjhVbY\PresentationSettings.exeC:\Users\Admin\AppData\Local\DQDjhVbY\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3532
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵PID:3804
-
C:\Users\Admin\AppData\Local\VxUsddzXP\sessionmsg.exeC:\Users\Admin\AppData\Local\VxUsddzXP\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2692
-
C:\Windows\system32\omadmclient.exeC:\Windows\system32\omadmclient.exe1⤵PID:4848
-
C:\Users\Admin\AppData\Local\v5OGiyGf\omadmclient.exeC:\Users\Admin\AppData\Local\v5OGiyGf\omadmclient.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5790799a168c41689849310f6c15f98fa
SHA1a5d213fc1c71a56de9441b2e35411d83770c01ec
SHA2566e59ab1a0b4ac177dc3397a54afcf68fcea3c1ee72c33bd08c89f04a6dac64b8
SHA5128153b79d4681f21ade7afe995841c386bff8e491ad347f8e7c287df5f9053cae7458e273339146d9a920ceaa2ba0f41cc793d7b2c0fa80efbb41477d39470866
-
Filesize
995KB
MD5d6142026702cd703e11c3493950d10dd
SHA1fa93dfc601fbeffabedc161078c9b9d2be06f7ec
SHA256a30f986a6b88cd983ec84c8e4d701e449ffb3556756ed6ea97e8b0837e6b30f1
SHA512450b05e524738fd075c5603e40e869865ea73800e8ad64e9005fb33746ff9c99e0f300a0c934b6184ac12599e73a876b0db3ffbdba55f3dd47fda090508533ef
-
Filesize
1.2MB
MD5c016866ff0a70538b94c26a37297b943
SHA179fd95a22af69b5069eda36642eb958c865ff2db
SHA256a05acf2c76c3d86a0b0cfc8b097ca7249c27aaefc34c4ac4b201f391353e487f
SHA512f378d90871c44de5dd02e138467ac037e81b6ae9b9907093fb9d039a56c65ce75094492b59536c8e6409e323302a79fe47ae1161c56aa4f87911e9eb035bc636
-
Filesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
Filesize
990KB
MD51c89a441b3ea7c7c4f928ced3df6f08f
SHA12067b1c7937edd1bb5b87691cb280a78cf93e228
SHA2561f37ffea67a247bd5122022fa271bdf3199f16e689a95cb9ddd2170a458c9fda
SHA5126bf6edac3e523ea870c3888959fdb225ecca5f8ce1b08b018e6ccdee33ae293f477a80702e701637404eb7e18026e267d17e9465fbb314a08bbc96e7cf49b2c7
-
Filesize
425KB
MD58992b5b28a996eb83761dafb24959ab4
SHA1697ecb33b8ff5b0e73ef29ce471153b368b1b729
SHA256e0c6c1b082c5d61be95b7fad95155b7cb2e516d6dcd51b8e1554a176876699e7
SHA5124ab0d71f6f9e5a5d0870d8e6eaa4b5db74ea6148de0a00603e3e56303d0fec4722172e0207b9678a5bd0136f2d43d43b9d34907183369ab3b9b9c1484034fe3d
-
Filesize
972B
MD53648a651a101e21ff17d3e1ce6c5da28
SHA1a26867eb3685e1415911293a1f5c2f5e152d1ac9
SHA25647feb0a1aca0e2261c53c44d933c777220ee66f9e22465ca98ea8e1c9227213f
SHA5121f2c14c6b734316dac33b83cafd88682c3f59feb7ad2c0d875819b3ded8c629c2ea60939fde7b85909e002dd8c81ec7ceddeed07845356cce8b70c29a5594790