Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
24532b6718d3665f61db9982be0fa5a6_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
24532b6718d3665f61db9982be0fa5a6_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
24532b6718d3665f61db9982be0fa5a6
-
SHA1
de1d4721719be5814041d99a4559fdcb5296c985
-
SHA256
fc52e505c69f58c26100ca9bb35c3f39bc35dd9864d7f8dd5ebd119e730b51e5
-
SHA512
e73462d6a299bc8bb208e704136061424aeff0f73e3d067ab37d08b2eb84a4a18de9baa937cfb7f22a3aec27fb1f91ba0af779c01beb9157c9dcecc8a0461d5d
-
SSDEEP
24576:suYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:E9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3532-4-0x00000000031B0000-0x00000000031B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1144 msdt.exe 2536 sigverif.exe 4348 SystemPropertiesPerformance.exe -
Loads dropped DLL 3 IoCs
pid Process 1144 msdt.exe 2536 sigverif.exe 4348 SystemPropertiesPerformance.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pvcesus = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\kfTpEpoCVWP\\sigverif.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1584 rundll32.exe 1584 rundll32.exe 1584 rundll32.exe 1584 rundll32.exe 1584 rundll32.exe 1584 rundll32.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3532 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2700 3532 Process not Found 84 PID 3532 wrote to memory of 2700 3532 Process not Found 84 PID 3532 wrote to memory of 1144 3532 Process not Found 85 PID 3532 wrote to memory of 1144 3532 Process not Found 85 PID 3532 wrote to memory of 2472 3532 Process not Found 86 PID 3532 wrote to memory of 2472 3532 Process not Found 86 PID 3532 wrote to memory of 2536 3532 Process not Found 87 PID 3532 wrote to memory of 2536 3532 Process not Found 87 PID 3532 wrote to memory of 904 3532 Process not Found 88 PID 3532 wrote to memory of 904 3532 Process not Found 88 PID 3532 wrote to memory of 4348 3532 Process not Found 89 PID 3532 wrote to memory of 4348 3532 Process not Found 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24532b6718d3665f61db9982be0fa5a6_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:2700
-
C:\Users\Admin\AppData\Local\QSYHS6\msdt.exeC:\Users\Admin\AppData\Local\QSYHS6\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1144
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵PID:2472
-
C:\Users\Admin\AppData\Local\cSy20f\sigverif.exeC:\Users\Admin\AppData\Local\cSy20f\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2536
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:904
-
C:\Users\Admin\AppData\Local\eZtzYTl5\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\eZtzYTl5\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5622b7ed367a509a5d5c91ff1301e3b52
SHA153a36995557efbccf702c6770460f93709833f25
SHA256eb394b4c5d10b0547539c97fba87635dbd49853d2c361630af04d4cf0d505058
SHA512fae7bc082bded602a0c0518cdb4c7196c4f35084c7814f4dd152883266778c34e0f8bc4108a46c1af54407206b63f326072fc767b60b5ffe587a1944e2eb70f5
-
Filesize
421KB
MD5992c3f0cc8180f2f51156671e027ae75
SHA1942ec8c2ccfcacd75a1cd86cbe8873aee5115e29
SHA2566859d1b5d1beaa2985b298f3fcee67f0aac747687a9dec2b4376585e99e9756f
SHA5121f1b8d39e29274cfc87a9ef1510adb9c530086a421c121523376731c8933c6e234e9146310d3767ce888a8dce7a5713221f4d25e5b7b6398d06ae2be2b99eadf
-
Filesize
1.2MB
MD5b0fc9ae4ef3084119ae269bc8d0a346c
SHA16c72826d073cfc13dc9d658c0f4bf4cac401662a
SHA2560818f3f4cf46d8603b09a1092fc54c27fdfafd7e4bc7734676865fa17cf72e4b
SHA5127d35394f8137ac63cc24f790ee1983b352417d8e42f6c3fcb73845e5f25d19cacc5a531d7caaac5dbda1e19016713166f5b1de4462a43ae36455970eb4386437
-
Filesize
77KB
MD52151a535274b53ba8a728e542cbc07a8
SHA1a2304c0f2616a7d12298540dce459dd9ccf07443
SHA256064de47877b00dc35886e829a697e4adb3d3cfdf294ddba13b6009a0f415b1bd
SHA512e6fd520ee1bd80a5fe8a7c2ae6446dcaabd4e335a602c36356f85305abef751b7dffa7eaac1ec13c105ccd8c3e9070bd32ed4b14bc8a9e52dc5f47b936d69a9f
-
Filesize
1.2MB
MD5c934d9a8d074467969d08fe8b66a8b2a
SHA1d42d21c8e481d3a4a08db2b25b6448dbaf82a36a
SHA25626cceefb11c0d62235a133da96035019ca3a11815c8d7242c6f7c33aeb6138a3
SHA512f5d34f5842003e7655b5ccb9152f474c0549e64d525877c039410432ea9e42c4a6ba8bbcff84f865fe53c915bbc8f24a1dc7f33e1a8ef778ef1d7c2ae219d73e
-
Filesize
82KB
MD5e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1adbfa782b7998720fa85678cc85863b961975e28
SHA256b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
SHA512c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6
-
Filesize
1KB
MD5e50bbd7303d59c3c044696563b295d0c
SHA1a9d4e5b76c9f3aa1076b0db212fcc2040698281b
SHA256c85e9eb38ebec9db520099e962ba8e17040ce83728dcf75f5af53f6e874142b5
SHA512931838a4aeb30415c04648ba3c01a106454b6b83b701edb435e95d7d909a13539281c45adff19b16a6d732281c1633b23bee5ff1dbed4d71873caff4ec3df47e