Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 12:41
Static task
static1
Behavioral task
behavioral1
Sample
060b59843389a4333c15ef205c5fd793_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
060b59843389a4333c15ef205c5fd793_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
060b59843389a4333c15ef205c5fd793_JaffaCakes118.dll
-
Size
876KB
-
MD5
060b59843389a4333c15ef205c5fd793
-
SHA1
10d69c27d16a32dccef75288fc286b07b6bab498
-
SHA256
e5db20f974acc6c68386f1de1c5fc3f65799ee320308e82ebc1701236266e353
-
SHA512
45996e3a340efb973fedb32f4855223139bb35d0f8b6cad645b3d29f9b3fbea167cba33948983ffc0898e3a89dfddf22a2a8c9edb515e37110e41864bb886a96
-
SSDEEP
12288:bdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:5MIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3552-3-0x0000000002DA0000-0x0000000002DA1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/3940-0-0x0000000140000000-0x00000001400DB000-memory.dmp dridex_payload behavioral2/memory/3552-59-0x0000000140000000-0x00000001400DB000-memory.dmp dridex_payload behavioral2/memory/3552-47-0x0000000140000000-0x00000001400DB000-memory.dmp dridex_payload behavioral2/memory/3940-62-0x0000000140000000-0x00000001400DB000-memory.dmp dridex_payload behavioral2/memory/620-69-0x0000000140000000-0x00000001400DC000-memory.dmp dridex_payload behavioral2/memory/620-74-0x0000000140000000-0x00000001400DC000-memory.dmp dridex_payload behavioral2/memory/1140-90-0x0000000140000000-0x00000001400DC000-memory.dmp dridex_payload behavioral2/memory/3496-106-0x0000000140000000-0x00000001400DC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
lpksetup.exeosk.exeMusNotificationUx.exepid process 620 lpksetup.exe 1140 osk.exe 3496 MusNotificationUx.exe -
Loads dropped DLL 3 IoCs
Processes:
lpksetup.exeosk.exeMusNotificationUx.exepid process 620 lpksetup.exe 1140 osk.exe 3496 MusNotificationUx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zyaxxifxvt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~2\\hZ\\osk.exe" -
Processes:
lpksetup.exeosk.exeMusNotificationUx.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MusNotificationUx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe 3940 rundll32.exe 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 3552 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3552 wrote to memory of 3648 3552 lpksetup.exe PID 3552 wrote to memory of 3648 3552 lpksetup.exe PID 3552 wrote to memory of 620 3552 lpksetup.exe PID 3552 wrote to memory of 620 3552 lpksetup.exe PID 3552 wrote to memory of 216 3552 osk.exe PID 3552 wrote to memory of 216 3552 osk.exe PID 3552 wrote to memory of 1140 3552 osk.exe PID 3552 wrote to memory of 1140 3552 osk.exe PID 3552 wrote to memory of 4756 3552 MusNotificationUx.exe PID 3552 wrote to memory of 4756 3552 MusNotificationUx.exe PID 3552 wrote to memory of 3496 3552 MusNotificationUx.exe PID 3552 wrote to memory of 3496 3552 MusNotificationUx.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\060b59843389a4333c15ef205c5fd793_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵
-
C:\Users\Admin\AppData\Local\aRFTTH4\lpksetup.exeC:\Users\Admin\AppData\Local\aRFTTH4\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵
-
C:\Users\Admin\AppData\Local\tFowOMLm\osk.exeC:\Users\Admin\AppData\Local\tFowOMLm\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\MusNotificationUx.exeC:\Windows\system32\MusNotificationUx.exe1⤵
-
C:\Users\Admin\AppData\Local\rRvq06\MusNotificationUx.exeC:\Users\Admin\AppData\Local\rRvq06\MusNotificationUx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\aRFTTH4\dpx.dllFilesize
880KB
MD5c0f038c3fed7ba22e36a31c3096e4037
SHA15f75c6fa7043df133cf24ec8f4d5ffe0bef89601
SHA2562f703f5c31de7b1dae1870b83fc2c11e95e6db543bd7fa7481e0b17592f6afb1
SHA512d242ea10bd3f0fbf1a02cb68660ccf88659e2a894471374bec9d2e94b6d3fbd63387e53802ab2557d5fc19572f4e8e1c29ddad048024dc9d97a4e59de499e4ef
-
C:\Users\Admin\AppData\Local\aRFTTH4\lpksetup.exeFilesize
728KB
MD5c75516a32e0aea02a184074d55d1a997
SHA1f9396946c078f8b0f28e3a6e21a97eeece31d13f
SHA256cb3cbeaaff7c07b044f70177e2899a87e80840d177238eb7dd25b8d9e20bef22
SHA51292994fdb75b15742e33e6d7a499664b722e45b9c160d8cc42d30bc727044063d589f45853692b5b754df6ff0fd21294dc32fed985b153f93f4bcf9f8c89a5bcc
-
C:\Users\Admin\AppData\Local\rRvq06\MusNotificationUx.exeFilesize
615KB
MD5869a214114a81712199f3de5d69d9aad
SHA1be973e4188eff0d53fdf0e9360106e8ad946d89f
SHA256405c2df9a36d7cfb5c8382c96f04792eb88c11a6cfa36b1d2ec3e0bec8d17361
SHA512befcdeb8de6e68b9ee0bacd4cbc80f7393a0213d4039b239c98585e0cd5db1755c75559a62372374cbfb7132b6a7973ea9e6a31952e0e0ba007079c56e6d9012
-
C:\Users\Admin\AppData\Local\rRvq06\XmlLite.dllFilesize
880KB
MD5c7aed7b5e7730f6187b4520db0a656da
SHA148425f5d919e24aa7eee670886f02804bbaffdb9
SHA256078a1a26643880debc5f642a274a4784e1c59caef6e99a4f16e458f07d3aa0ad
SHA512fbc76e887e5c108f30f83fac0ba43aab80ecc26f2b16dd94eada244bafc251abedeece1cde84c8e2e5f00f873c106ec9f6a27b366938795cbb2444336f683689
-
C:\Users\Admin\AppData\Local\tFowOMLm\WMsgAPI.dllFilesize
880KB
MD50687039e308b046a787fabc68cb483fd
SHA120fd0244bfb09491e1a0fb103deeee7e90ad3deb
SHA256b02bfa9ffc5f0d4e54cd20cec66e03693a604e9d61a545bde7fbd5932e19bb7f
SHA512f8bf52874de977800519454126b5caf35b23c58ddf5e16cd50e454983a369e793459d74c01d16bb77cc4cc5e262e57468aa776983f16ea0cbae8cea296236114
-
C:\Users\Admin\AppData\Local\tFowOMLm\osk.exeFilesize
638KB
MD5745f2df5beed97b8c751df83938cb418
SHA12f9fc33b1bf28e0f14fd75646a7b427ddbe14d25
SHA256f67ef6e31fa0eaed44bfbab5b908be06b56cbc7d5a16ab2a72334d91f2bb6a51
SHA5122125d021e6f45a81bd75c9129f4b098ad9aa15c25d270051f4da42458a9737bff44d6adf17aa1f2547715d159fb621829f7cd3b9d42f1521c919549cc7deb228
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Kscubvdexgimjec.lnkFilesize
1KB
MD598e19daed21e17c1a3b354ec535a18ea
SHA1bd0f7eadc14cb6e5fec216e0307dbb163af786ae
SHA25698932753eced6617bcda8d557344763aa93c03f119f0a66493a913388f0057e4
SHA51291640a0d1693ecff47a507ce8af37a7789169f624e75595bbc2650ed10847e88e06acb73f278102f9d8540eb289c292cdc59e5d64e99f6e2c0ea61a1fbf0d7f6
-
memory/620-74-0x0000000140000000-0x00000001400DC000-memory.dmpFilesize
880KB
-
memory/620-71-0x000002270B660000-0x000002270B667000-memory.dmpFilesize
28KB
-
memory/620-69-0x0000000140000000-0x00000001400DC000-memory.dmpFilesize
880KB
-
memory/1140-90-0x0000000140000000-0x00000001400DC000-memory.dmpFilesize
880KB
-
memory/1140-87-0x000002440AB10000-0x000002440AB17000-memory.dmpFilesize
28KB
-
memory/3496-103-0x000002A0E0AD0000-0x000002A0E0AD7000-memory.dmpFilesize
28KB
-
memory/3496-106-0x0000000140000000-0x00000001400DC000-memory.dmpFilesize
880KB
-
memory/3552-15-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-8-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-29-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-28-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-27-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-26-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-25-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-24-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-23-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-22-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-21-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-18-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-17-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-16-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-5-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-13-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-14-0x00007FFA8F12A000-0x00007FFA8F12B000-memory.dmpFilesize
4KB
-
memory/3552-12-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-11-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-10-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-9-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-30-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-7-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-6-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-31-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-19-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-3-0x0000000002DA0000-0x0000000002DA1000-memory.dmpFilesize
4KB
-
memory/3552-32-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-33-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-34-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-35-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-36-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-37-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-38-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-47-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-48-0x0000000001030000-0x0000000001037000-memory.dmpFilesize
28KB
-
memory/3552-49-0x00007FFA8F5E0000-0x00007FFA8F5F0000-memory.dmpFilesize
64KB
-
memory/3552-59-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-50-0x00007FFA8F5D0000-0x00007FFA8F5E0000-memory.dmpFilesize
64KB
-
memory/3552-39-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3552-20-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3940-0-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB
-
memory/3940-2-0x000001CD9C390000-0x000001CD9C397000-memory.dmpFilesize
28KB
-
memory/3940-62-0x0000000140000000-0x00000001400DB000-memory.dmpFilesize
876KB