Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
b7a2e00a6f0a560d3230fb624e59871b_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
b7a2e00a6f0a560d3230fb624e59871b_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b7a2e00a6f0a560d3230fb624e59871b
-
SHA1
7377a79136e1d9787cd431f389419865cb2bc086
-
SHA256
c2bcb7fc70fedc285ef4250a1244ece0a6455aca49bf76ee6bdd1e9add01ed28
-
SHA512
bd3cda925d1a12d1694408992eaa7c2591837a9ccdc318bda2cf4ce742abb420bc1a02928099d7a1115651d54d153d6e202bb9e7a00217b64e187d572c4fba1c
-
SSDEEP
24576:AVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8I:AV8hf6STw1ZlQauvzSq01ICe6zvmt
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3464-4-0x00000000035A0000-0x00000000035A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdpinput.exeSystemPropertiesDataExecutionPrevention.exepsr.exepid process 4608 rdpinput.exe 1460 SystemPropertiesDataExecutionPrevention.exe 4764 psr.exe -
Loads dropped DLL 3 IoCs
Processes:
rdpinput.exeSystemPropertiesDataExecutionPrevention.exepsr.exepid process 4608 rdpinput.exe 1460 SystemPropertiesDataExecutionPrevention.exe 4764 psr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iphtcfjrejti = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\SYSTEM~1\\MxkYhHLy\\SYSTEM~1.EXE" -
Processes:
rundll32.exerdpinput.exeSystemPropertiesDataExecutionPrevention.exepsr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
pid process 3464 3464 3464 3464 3464 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 3464 3464 3464 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3464 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3464 wrote to memory of 1664 3464 rdpinput.exe PID 3464 wrote to memory of 1664 3464 rdpinput.exe PID 3464 wrote to memory of 4608 3464 rdpinput.exe PID 3464 wrote to memory of 4608 3464 rdpinput.exe PID 3464 wrote to memory of 2968 3464 SystemPropertiesDataExecutionPrevention.exe PID 3464 wrote to memory of 2968 3464 SystemPropertiesDataExecutionPrevention.exe PID 3464 wrote to memory of 1460 3464 SystemPropertiesDataExecutionPrevention.exe PID 3464 wrote to memory of 1460 3464 SystemPropertiesDataExecutionPrevention.exe PID 3464 wrote to memory of 1684 3464 psr.exe PID 3464 wrote to memory of 1684 3464 psr.exe PID 3464 wrote to memory of 4764 3464 psr.exe PID 3464 wrote to memory of 4764 3464 psr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7a2e00a6f0a560d3230fb624e59871b_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵
-
C:\Users\Admin\AppData\Local\texyXF\rdpinput.exeC:\Users\Admin\AppData\Local\texyXF\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵
-
C:\Users\Admin\AppData\Local\QcVzea8\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\QcVzea8\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\liePgmH\psr.exeC:\Users\Admin\AppData\Local\liePgmH\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\QcVzea8\SYSDM.CPLFilesize
1.2MB
MD5339ddddb62d48a9820e78d92997ea9ca
SHA137f45f2e1f409134620609e97834f32a4bd91076
SHA256d26b0a4f45c8a8cf389a2d715e1023dfeb65d24eb3306f1f92f77d289e0260d5
SHA51256e060309747392680e57711ad19c239c95629e6924384f1eb0ee493ef905f80533acdca9ab758cf99c0a786d962bbd47e4fe8806cff6067ca05ffe58fe95339
-
C:\Users\Admin\AppData\Local\QcVzea8\SystemPropertiesDataExecutionPrevention.exeFilesize
82KB
MD5de58532954c2704f2b2309ffc320651d
SHA10a9fc98f4d47dccb0b231edf9a63309314f68e3b
SHA2561f810658969560f6e7d7a14f71d1196382e53b984ca190fa9b178ac4a32acfb3
SHA512d4d57cc30d9079f4e9193ba42631e8e53d86b22e9c655d7a8c25e5be0e5e1d6dfff4714ddc23e3e392809d623b4f8d43c63893f74c325fc77459ac03c7a451ed
-
C:\Users\Admin\AppData\Local\liePgmH\VERSION.dllFilesize
1.2MB
MD53ae9b0d89a8d347fea0cc3fc04d1e773
SHA1d9f47eb1b8c2f1a773ef6821a3a42dd353e86bf1
SHA2567ff2a7d2ed739ca0b6b6099e216656aaf02010be058b4115233c775d6f8e7039
SHA512eef6030ba14e7cb63b3a7ff76e3177bff3adeb6fd5f3c6094ea4ceb323dddcb4121b1bc32b4a9b51c0ca5c792cbceed4b6150b30593ce18dec899a226d8812c1
-
C:\Users\Admin\AppData\Local\liePgmH\psr.exeFilesize
232KB
MD5ad53ead5379985081b7c3f1f357e545a
SHA16f5aa32c1d15fbf073558fadafd046d97b60184e
SHA2564f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f
SHA512433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0
-
C:\Users\Admin\AppData\Local\texyXF\WTSAPI32.dllFilesize
1.2MB
MD5a490ab9f3a309f185486c380af883a66
SHA177cc5a98ca474d578d3d9db0c3c7e50e7248ec4a
SHA256b49976cfa8ab73fb398265fa7675a5ab0ffc4a7559723453301c0d53a20287d9
SHA512bc826c6adb3d1ddcb891a3988f7ed81b61baaa2b9de7d674a3419f6eb063d1b53b3a6f020ac8422d96f688a3f37daefb9043e8e70f54bed0c668a62ddd746214
-
C:\Users\Admin\AppData\Local\texyXF\rdpinput.exeFilesize
180KB
MD5bd99eeca92869f9a3084d689f335c734
SHA1a2839f6038ea50a4456cd5c2a3ea003e7b77688c
SHA25639bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143
SHA512355433c3bbbaa3bcb849633d45713d8a7ac6f87a025732fbe83e259ec3a0cb4eabb18239df26609453f9fc6764c7276c5d0472f11cf12d15ef806aa7594d090e
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Lyvwlrjkvg.lnkFilesize
1KB
MD5e152f8cf073afd8b2d602d3ab3689669
SHA1e5ee9da6eb6369c778bddaf694de9b7cd2c16b67
SHA2561fa7f0b6d0792141224b0c551d1818700c44e01f881f4245a76ef872cb62c5b1
SHA512b3b5bdc0c89db3c4b25c1f786268fcf87843768a64b0cb7aac9d1959a02ac9615271ae80edb0ef6b57eceeb7999171a9a44fbefcd9cc6123db08534d40113b1e
-
memory/1460-67-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1460-66-0x000001E62AE70000-0x000001E62AE77000-memory.dmpFilesize
28KB
-
memory/3464-7-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-12-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-11-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-9-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-8-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-4-0x00000000035A0000-0x00000000035A1000-memory.dmpFilesize
4KB
-
memory/3464-6-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-10-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-31-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-34-0x00007FFA91E8A000-0x00007FFA91E8B000-memory.dmpFilesize
4KB
-
memory/3464-13-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-22-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/3464-36-0x00007FFA932B0000-0x00007FFA932C0000-memory.dmpFilesize
64KB
-
memory/3464-35-0x0000000003580000-0x0000000003587000-memory.dmpFilesize
28KB
-
memory/4608-50-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/4608-44-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/4608-47-0x000001D2B9BE0000-0x000001D2B9BE7000-memory.dmpFilesize
28KB
-
memory/4764-81-0x000002868FB20000-0x000002868FB27000-memory.dmpFilesize
28KB
-
memory/4764-84-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/5084-37-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/5084-0-0x000001B2B2570000-0x000001B2B2577000-memory.dmpFilesize
28KB
-
memory/5084-1-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB