Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
16cc32046e3f43e3f81212459202d425_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
16cc32046e3f43e3f81212459202d425_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
16cc32046e3f43e3f81212459202d425
-
SHA1
bc204f585686521d375206fe3e5a2102386b8373
-
SHA256
2bfc8831b8af3293c743d4ee34b980c80195ce55d33ae89fbc3dabdaf73deef5
-
SHA512
2288176da59029620b0ab7afb03cd977595d70028d8f704c4ce7ee0593862607ff1fb4c12e4fff079d8e827e1859104ebc4363edfd55d697231722163dcc6aed
-
SSDEEP
24576:MuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:k9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3564-4-0x0000000000810000-0x0000000000811000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1200 sessionmsg.exe 3772 msdt.exe 800 PasswordOnWakeSettingFlyout.exe -
Loads dropped DLL 3 IoCs
pid Process 1200 sessionmsg.exe 3772 msdt.exe 800 PasswordOnWakeSettingFlyout.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Afjiowtqszdc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\Managed\\WORDDO~1\\1033\\B5BKOF~1\\msdt.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordOnWakeSettingFlyout.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1140 rundll32.exe 1140 rundll32.exe 1140 rundll32.exe 1140 rundll32.exe 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found 3564 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3564 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3044 3564 Process not Found 84 PID 3564 wrote to memory of 3044 3564 Process not Found 84 PID 3564 wrote to memory of 1200 3564 Process not Found 85 PID 3564 wrote to memory of 1200 3564 Process not Found 85 PID 3564 wrote to memory of 3704 3564 Process not Found 86 PID 3564 wrote to memory of 3704 3564 Process not Found 86 PID 3564 wrote to memory of 3772 3564 Process not Found 87 PID 3564 wrote to memory of 3772 3564 Process not Found 87 PID 3564 wrote to memory of 700 3564 Process not Found 88 PID 3564 wrote to memory of 700 3564 Process not Found 88 PID 3564 wrote to memory of 800 3564 Process not Found 89 PID 3564 wrote to memory of 800 3564 Process not Found 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16cc32046e3f43e3f81212459202d425_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵PID:3044
-
C:\Users\Admin\AppData\Local\pY3YX45\sessionmsg.exeC:\Users\Admin\AppData\Local\pY3YX45\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1200
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:3704
-
C:\Users\Admin\AppData\Local\R9P5VxL\msdt.exeC:\Users\Admin\AppData\Local\R9P5VxL\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3772
-
C:\Windows\system32\PasswordOnWakeSettingFlyout.exeC:\Windows\system32\PasswordOnWakeSettingFlyout.exe1⤵PID:700
-
C:\Users\Admin\AppData\Local\XP9T\PasswordOnWakeSettingFlyout.exeC:\Users\Admin\AppData\Local\XP9T\PasswordOnWakeSettingFlyout.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD523258cd626cba18a7450ff155c5c205a
SHA1cd3c4e5619f2642c0610bfa239218ea776ef2462
SHA2562380d125353f46b4688cbac7208238f32b53e3c94b9c8ff4a7ed21a0adb39ec4
SHA5127079f76d4c07c889ad9d22eba1f088ed7e8b42225160952844935247f02d414f804d5df2f1afdc33b03d0f07b01eaae8cef2bd20089485c1ce1523676bc41480
-
Filesize
421KB
MD5992c3f0cc8180f2f51156671e027ae75
SHA1942ec8c2ccfcacd75a1cd86cbe8873aee5115e29
SHA2566859d1b5d1beaa2985b298f3fcee67f0aac747687a9dec2b4376585e99e9756f
SHA5121f1b8d39e29274cfc87a9ef1510adb9c530086a421c121523376731c8933c6e234e9146310d3767ce888a8dce7a5713221f4d25e5b7b6398d06ae2be2b99eadf
-
Filesize
1.4MB
MD5dcb2e1a329633d016f1ada0373f71446
SHA1c8345d13ac01cc0992e106900b9c45f71dc7758e
SHA256b1286aea6970b087e357763b40d747c2b5ca151a5a528e8b726915adfcf7376a
SHA5126455ff537bdc0c75235f87cf6af506b3bffb1983d22c36141607657877852b93029bb2b60c291cef2045b5a1fa3da2ef49b6c24b4a3e51e1c63773d42b81b57c
-
Filesize
44KB
MD5591a98c65f624c52882c2b238d6cd4c4
SHA1c960d08c19d777069cf265dcc281807fbd8502d7
SHA2565e6ed524c955fb1ea3e24f132987143da3ec81db5041a0edcfa7bf3ac790eb06
SHA5121999f23c90d85857461f8ddc5342470296f6939a654ac015780c2977f293c1f799fc992462f3d4d9181c97ab960db3291b85ea7c0537edcb57755706b20b6074
-
Filesize
1.4MB
MD504d0d6f10e8f89f4e7cbcca26ec2d823
SHA1a8ecce61c38ba6cfd8bc1690f2c4853f72451583
SHA256baae288cf16504179df42f7f362af53ff837aaa0314b3f592e898fc784b4d256
SHA5120fd3cb79a275311da92897c5736071d1d2d80d3d9a96b0d3103af20df9d558e1e0c1bd784a5c555a44419afb67c1e664655755759659e1ebfa751668bf96f2e8
-
Filesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
Filesize
1KB
MD546cf66f0d9cd18ba3705c2f3ff5f33f5
SHA1fbf3c6aacc8ff900fb4652008b01c374d070a6bb
SHA25645ba12db923d8b4637da0aaf02863313223d12fe88ab8839e3c56793c1c50f0d
SHA512fb599a5cc1f074bc9478974094bc1187fbb99d2f88ec4055babd33c2eaa3099ff9697fe9dd7745bf77ee2e8ba21ceb8f8bbe3b01d492925ec713e97e0043e7a4