Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
13e1a42e69f65bb0ba2b34cf2af03ccc_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
13e1a42e69f65bb0ba2b34cf2af03ccc_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
13e1a42e69f65bb0ba2b34cf2af03ccc
-
SHA1
5c28617b1b763dbf9d0de3c0c5c009b719c6e022
-
SHA256
ff606bc5ec4c065454914bdb2ea526a8f2dfa2ff635b18124799922cd8f4395d
-
SHA512
54e2a898132028d76ebd6ad31f85b455a42f15a7ba495add6511266f31ad522806fcc828639b12e3b0dc1a511f917adbddabf675a13cbd9e533312926274c9b4
-
SSDEEP
24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:F9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3488-4-0x0000000002460000-0x0000000002461000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1928 sppsvc.exe 1956 GamePanel.exe 1716 CustomShellHost.exe -
Loads dropped DLL 4 IoCs
pid Process 1928 sppsvc.exe 1956 GamePanel.exe 1956 GamePanel.exe 1716 CustomShellHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-807826884-2440573969-3755798217-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ahvkwrxhngjqh = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\iQ\\GamePanel.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CustomShellHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sppsvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4788 rundll32.exe 4788 rundll32.exe 4788 rundll32.exe 4788 rundll32.exe 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Process not Found -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3488 wrote to memory of 1928 3488 Process not Found 85 PID 3488 wrote to memory of 1928 3488 Process not Found 85 PID 3488 wrote to memory of 1920 3488 Process not Found 86 PID 3488 wrote to memory of 1920 3488 Process not Found 86 PID 3488 wrote to memory of 1956 3488 Process not Found 87 PID 3488 wrote to memory of 1956 3488 Process not Found 87 PID 3488 wrote to memory of 2396 3488 Process not Found 88 PID 3488 wrote to memory of 2396 3488 Process not Found 88 PID 3488 wrote to memory of 1716 3488 Process not Found 89 PID 3488 wrote to memory of 1716 3488 Process not Found 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13e1a42e69f65bb0ba2b34cf2af03ccc_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:4796
-
C:\Users\Admin\AppData\Local\OoqkGsHxF\sppsvc.exeC:\Users\Admin\AppData\Local\OoqkGsHxF\sppsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1928
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵PID:1920
-
C:\Users\Admin\AppData\Local\SvQT6E\GamePanel.exeC:\Users\Admin\AppData\Local\SvQT6E\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1956
-
C:\Windows\system32\CustomShellHost.exeC:\Windows\system32\CustomShellHost.exe1⤵PID:2396
-
C:\Users\Admin\AppData\Local\4MzJD\CustomShellHost.exeC:\Users\Admin\AppData\Local\4MzJD\CustomShellHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
835KB
MD570400e78b71bc8efdd063570428ae531
SHA1cd86ecd008914fdd0389ac2dc00fe92d87746096
SHA25691333f3282a2420359ae9d3adf537688741d21e964f021e2b152ab293447f289
SHA51253005dda237fb23af79f54779c74a09835ad4cad3ca7b9dcec80e3793a60dd262f45b910bef96ab9c8e69d0c6990fea6ca5fee85d7f8425db523ae658372959e
-
Filesize
1.2MB
MD510b43c2aedd38a2a9addcf191c85558a
SHA181c60d74d2d5b6222b80cab3cd019525c8da9281
SHA256d66f4c17a5ccc539fc4026aaf28694afe6d4b2830e1736d7304b14455f03c4ca
SHA5124651c8c408158da16fc1dd0b74424f10f61da0d761ee4d412ce3904dd76a20848811c6a30475a2faea137ff2243606ffa0677c1f9aebb34510f4eeac5edff977
-
Filesize
1.2MB
MD503ac6807e886dfd2f6656b455eb5a88e
SHA108e17e360d14653e47db77e80a5960a888524252
SHA256bca9aa102f03f52dd89f3ef71ea7b4b0569d66cde24090afeacd5038a984024a
SHA512065d8b87136898810e9a23f961ed268d2b9e49f88ad3bdb0c33cf4b458a134649135290324f35dc24541b2c6630f96dcec3101f2f34e698188ee03aeed430dd3
-
Filesize
4.4MB
MD5ec6cef0a81f167668e18fa32f1606fce
SHA16d56837a388ae5573a38a439cee16e6dde5b4de8
SHA25682c59a2f606ebf1a8a0de16be150600ac63ad8351c6bf3952c27a70257cb70f8
SHA512f40b37675329ca7875d958b4b0019082548a563ada217c7431c2ca5c7f93957b242f095f7f04bcdd6240b97ea99e89bfe3a003f97c43366d00a93768fef7b4c5
-
Filesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
Filesize
1.2MB
MD5ed9f90204a57a0618e805a041dd910ff
SHA1ea6baf5fe4ed6ab51848fa3354516bc2f11f1b69
SHA2563fb8f6dd3850c9a1b3228f147d23dc442e3b5c7ebdbdd15bcf51ebd19110b51a
SHA512656fce7564e135c27f26750a7e815522a745f9738fda757527002cad825a62aada3377f01789d12b2f3805286b589b7114eebc7c9fa4f6f412b00c6e23463769
-
Filesize
1KB
MD540c35ac555bb2e5baf3f4d05c80133a3
SHA1750f2e7f84645b069ca86689f5fcd3a402c3c26f
SHA256b11706c91446479c74f829a0d889f6a136daf1f8d96ca71a740f6a0ce403d7f8
SHA5124993876c2ca74dc240734a1e5e8ed674705a659366d2298b3aeec502e3bbb0a3782a06ed28ee9c2b8e7f81d9ae23c54fbb012d7daed4c4f44a3a66217e929eab