Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
2fd82133005480e6e2d63dc37d378b35_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
2fd82133005480e6e2d63dc37d378b35_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
2fd82133005480e6e2d63dc37d378b35
-
SHA1
3b1e29f059c924bb0fd7186be4752c3dcfc8590c
-
SHA256
df363cbf7ba7d2239bdc9e4ea6d89bc8dd24cae14179679808b08bd945cc40cc
-
SHA512
d6b354724a91101e94f3c136b0b45f328d9e03176821b04ae1ebb49f0a603eb70505fc35e9a69a4cd867bf8b31015a229906b050ed0d55bdde1ea0c308ab77bb
-
SSDEEP
24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:F9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3572-4-0x0000000003170000-0x0000000003171000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2256 mfpmp.exe 1596 RdpSa.exe 5080 OptionalFeatures.exe -
Loads dropped DLL 3 IoCs
pid Process 2256 mfpmp.exe 1596 RdpSa.exe 5080 OptionalFeatures.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xmulajyakcaxneu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\GbC2ycuF\\RdpSa.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OptionalFeatures.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1716 rundll32.exe 1716 rundll32.exe 1716 rundll32.exe 1716 rundll32.exe 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found 3572 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3572 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3572 wrote to memory of 1132 3572 Process not Found 84 PID 3572 wrote to memory of 1132 3572 Process not Found 84 PID 3572 wrote to memory of 2256 3572 Process not Found 85 PID 3572 wrote to memory of 2256 3572 Process not Found 85 PID 3572 wrote to memory of 5068 3572 Process not Found 86 PID 3572 wrote to memory of 5068 3572 Process not Found 86 PID 3572 wrote to memory of 1596 3572 Process not Found 87 PID 3572 wrote to memory of 1596 3572 Process not Found 87 PID 3572 wrote to memory of 3868 3572 Process not Found 88 PID 3572 wrote to memory of 3868 3572 Process not Found 88 PID 3572 wrote to memory of 5080 3572 Process not Found 89 PID 3572 wrote to memory of 5080 3572 Process not Found 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2fd82133005480e6e2d63dc37d378b35_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:1132
-
C:\Users\Admin\AppData\Local\pjv6T4v2\mfpmp.exeC:\Users\Admin\AppData\Local\pjv6T4v2\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2256
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe1⤵PID:5068
-
C:\Users\Admin\AppData\Local\B7EhKgIa\RdpSa.exeC:\Users\Admin\AppData\Local\B7EhKgIa\RdpSa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1596
-
C:\Windows\system32\OptionalFeatures.exeC:\Windows\system32\OptionalFeatures.exe1⤵PID:3868
-
C:\Users\Admin\AppData\Local\how3\OptionalFeatures.exeC:\Users\Admin\AppData\Local\how3\OptionalFeatures.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD55992f5b5d0b296b83877da15b54dd1b4
SHA10d87be8d4b7aeada4b55d1d05c0539df892f8f82
SHA25632f60eabe54c4d0cd0f0ec29f48f55ca1ad097bf35097247b186fd70426f847c
SHA5124f6da913af530301da1d0638aa2635ada446ebee6e27b5059db5c2b7fe439162ac3b1a595ecf4163a093890df9ac94d9085a53d8c991e48703f9d2691326e7e6
-
Filesize
1.2MB
MD5e981faf9dea1f393fa50c59f980b9393
SHA142e05bf5df634d593130a33f31f84a556b873356
SHA2569158b4772600abc54a71d4ba985f65a8e0aead2a41936b6e3053fffa79068826
SHA51290abc8dd1c7f57dc0fb807e8cb755fb60c5bc6f4897aca83cf4755e7b5b68fe67e33309412977f806e31355e8d9737b489f4a137f5716c7fd4c80b95933737a8
-
Filesize
110KB
MD5d6cd8bef71458804dbc33b88ace56372
SHA1a18b58445be2492c5d37abad69b5aa0d29416a60
SHA256fa2e741416994f2c1bf9ef7a16b9c4dbf20c84267e3da91ae6f1ad75ee9f49b8
SHA5121bed8af2cf99a7f3bb36a34f4a71c34787904bd072ecdc731fb7498290dcf4024b956fb8b6912ad050b74aa861f0b0349081b77088f72732bda5075413b1f83d
-
Filesize
1.2MB
MD580be566de901797188fa626ae99f3736
SHA1f5e96fa4ccfbcc23d93d5e80dccb2959d0a55340
SHA256dc67f7a2d66a431f9c077a5d56efa6675a0c1b5ab1b666ad0fe95f66324cc0a1
SHA5123d3c42580f54eea0f31d7739e69efa7ed4a0c2f78238d058231f4e937122d0ae4effa55693a64ea5f074bb7b084e41e96a1f5af634c36f2897251ac1ac1cfa6a
-
Filesize
1.2MB
MD5683ade4dffaf7e70d478ca6d4361ea5c
SHA15e43e9448d642d9031eac61f091b16790094f8f5
SHA256f5a8721800ee1a9cd8a5ce3e020e246c7e8f20e60e322cddfcb89111facabbc9
SHA512146e86b82d80de9046aa9ace651fa6ea22cd42554a2236c3b503028cb874264f00fa42b1db24bb0f82a6e989d350ebc2e0d78a574db1ec8157947907ef4d1a56
-
Filesize
46KB
MD58f8fd1988973bac0c5244431473b96a5
SHA1ce81ea37260d7cafe27612606cf044921ad1304c
SHA25627287ac874cef86be03aee7b6d34fdc3bd208070ed20e44621a305865fb7579e
SHA512a91179e1561168b3b58f5ca893bce425d35f4a02aec20ac3d6fb944f5eb3c06b0a1b9d9f3fb9ea87869d65671d2b89b4ae19acf794372bdbd27f5e9756c5a8ab
-
Filesize
1KB
MD5faa040eced130d3aa68d36529a54b10b
SHA17926f6bd0670152bd92b7fb6a9d84097f248dddc
SHA256917fdccd309c1ac83b34c3d029a17b8be336fb3074ca5ced87169413ad98ff1f
SHA512e0bb7ad0897a210a6cf4f5362142d9f455f94aa6051962171dfda4976aabcda26b9dcd1d6ec7d497d48429dfb7400f9fd31fa60ae05e66c46b59792447f714bd