Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
7c53147993a66509bf7cc0e461f60b57_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
7c53147993a66509bf7cc0e461f60b57_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
7c53147993a66509bf7cc0e461f60b57
-
SHA1
333cbc00c5d645ddf2394199163d10dbeba29af5
-
SHA256
a969bed6f7448696349028d766d421094510c7759828473a4a3dd8baf7fa37dd
-
SHA512
fa9fe560b9afc4cb01f8e7d950ebc8325c4b18e81942a391b3b58c4d1f8bf52a46a5e42dc4939f3d0432eb3189a8342d59cf02139dbc3c3f7104ff891258dde1
-
SSDEEP
24576:WuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:W9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2976-4-0x00000000025C0000-0x00000000025C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
MusNotificationUx.exeWMPDMC.exemspaint.exepid Process 4836 MusNotificationUx.exe 2584 WMPDMC.exe 2552 mspaint.exe -
Loads dropped DLL 3 IoCs
Processes:
MusNotificationUx.exeWMPDMC.exemspaint.exepid Process 4836 MusNotificationUx.exe 2584 WMPDMC.exe 2552 mspaint.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1266786182-1874524688-71015548-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zdgdcgkgx = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\PRINTE~1\\JR68OS~1\\WMPDMC.exe" -
Processes:
rundll32.exeMusNotificationUx.exeWMPDMC.exemspaint.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MusNotificationUx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WMPDMC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1288 rundll32.exe 1288 rundll32.exe 1288 rundll32.exe 1288 rundll32.exe 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 2976 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 2976 wrote to memory of 4464 2976 87 PID 2976 wrote to memory of 4464 2976 87 PID 2976 wrote to memory of 4836 2976 88 PID 2976 wrote to memory of 4836 2976 88 PID 2976 wrote to memory of 5048 2976 89 PID 2976 wrote to memory of 5048 2976 89 PID 2976 wrote to memory of 2584 2976 90 PID 2976 wrote to memory of 2584 2976 90 PID 2976 wrote to memory of 1316 2976 91 PID 2976 wrote to memory of 1316 2976 91 PID 2976 wrote to memory of 2552 2976 92 PID 2976 wrote to memory of 2552 2976 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c53147993a66509bf7cc0e461f60b57_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
C:\Windows\system32\MusNotificationUx.exeC:\Windows\system32\MusNotificationUx.exe1⤵PID:4464
-
C:\Users\Admin\AppData\Local\HcsnFd\MusNotificationUx.exeC:\Users\Admin\AppData\Local\HcsnFd\MusNotificationUx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4836
-
C:\Windows\system32\WMPDMC.exeC:\Windows\system32\WMPDMC.exe1⤵PID:5048
-
C:\Users\Admin\AppData\Local\wN4\WMPDMC.exeC:\Users\Admin\AppData\Local\wN4\WMPDMC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2584
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵PID:1316
-
C:\Users\Admin\AppData\Local\i8f\mspaint.exeC:\Users\Admin\AppData\Local\i8f\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD5869a214114a81712199f3de5d69d9aad
SHA1be973e4188eff0d53fdf0e9360106e8ad946d89f
SHA256405c2df9a36d7cfb5c8382c96f04792eb88c11a6cfa36b1d2ec3e0bec8d17361
SHA512befcdeb8de6e68b9ee0bacd4cbc80f7393a0213d4039b239c98585e0cd5db1755c75559a62372374cbfb7132b6a7973ea9e6a31952e0e0ba007079c56e6d9012
-
Filesize
1.2MB
MD57ec8c772ee0a2cc6b401f5739fe65950
SHA1ad15830ba00ddbe93c8648aa8d9e265eff3fadb9
SHA256b7fa358755cd9945cdebd2f3bc5a3002cb622b4971fbea990e40ca97da49b0ba
SHA51237f243420921bc54f9c0b09a381485188ccdd2fd47fd58b5aca7df20865a48785fa5d0b4208152daf8377cf52e9c09c9e30e6c59fa1d56bb37ff6d00c9dc8dc8
-
Filesize
1.2MB
MD50ae51a0b9f267cb1687d6767a92f0187
SHA1a2f328d38cebaf038aea661169e82aa6a2c8f485
SHA256fa48fdc4f6a168a8bcd78f112c71fe6608a82a13ac68a3a9069c4f310aef2ff2
SHA51281ff383830c9d62bdf79d7bbfba26a611cb6f144226c6fc964bce13915c8964a672f3dbbca1e2e1fd50276835c6cc658a3f9871e211b7fe7a252edca2154596a
-
Filesize
965KB
MD5f221a4ccafec690101c59f726c95b646
SHA12098e4b62eaab213cbee73ba40fe4f1b8901a782
SHA25694aa32a2c9c1d2db78318d9c68262c2f834abe26b6e9a661700324b55fdd5709
SHA5128e3f4e4f68565ef09f5e762d6bb41b160711bbacac9dfcbe33edea9885fd042e6ce9a248bfcc62f9cffdb8e6bbe1b04c89bd41fcd9a373a5c8bc7bbff96dceaf
-
Filesize
1.5MB
MD559ce6e554da0a622febce19eb61c4d34
SHA1176a4a410cb97b3d4361d2aea0edbf17e15d04c7
SHA256c36eba7186f7367fe717595f3372a49503c9613893c2ab2eff38b625a50d04ba
SHA512e9b0d310416b66e0055381391bb6b0c19ee26bbcf0e3bb9ea7d696d5851e6efbdd9bdeb250c74638b7d73b20528ea1dfb718e75ad5977aaad77aae36cc7b7e18
-
Filesize
1.2MB
MD501682768fbfbc918b0a110edb3959b89
SHA13f96bb4d39054f9f1df88ffc162e763c1e9b75df
SHA2561b6908b01877989b7fb9b2cc258eb76b57b6308934be98e22e4d11a43dc75a43
SHA5122b37d7d66a5973a8aa17ba55cb07eec563edef8bb0a39daecddc55f7e4e8427498d57870052ae3cf4e234b43c06206ee8b07e82a0ef768c8ea171ed23234e89e
-
Filesize
1KB
MD5993c986d56f7856cd5868ac317a214de
SHA16b32f091ebd24fa3f96c5484c4c58c174a358235
SHA2565f41d2d4e314a2b5b130d389b7e43432441baeb2d955e618ed9a70a23cc2550c
SHA5128b3af6178c5f3235bb1b34c83d630558d59bfc160ab1df2ccad9558c4c63a82090d2d2b82e108929a8517ea67029d76c8ef2e65c87bfe08c7ff4b213eb2a5964