Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
7ec087fb5c9ac0a2ed26f817ccbe872a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7ec087fb5c9ac0a2ed26f817ccbe872a_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
7ec087fb5c9ac0a2ed26f817ccbe872a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
7ec087fb5c9ac0a2ed26f817ccbe872a
-
SHA1
7e186b2401393151ba721cfb79533dd277235f30
-
SHA256
dc23e2b53c2f9f56939cd4765aaea383fb37e638afe4db25e55fcc33a065792c
-
SHA512
dfcf6d814a56829c535b1742be85c718839f386ef29e09281dce0afdf79046b4b507de23b30c1810938c26dfbb235ab8e650a6b7353560021db47903e026d12e
-
SSDEEP
24576:SuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:69cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3536-4-0x00000000026C0000-0x00000000026C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
Processes:
Narrator.exerecdisc.exerdpshell.exesessionmsg.exepid Process 4620 Narrator.exe 4600 recdisc.exe 1960 rdpshell.exe 3296 sessionmsg.exe -
Loads dropped DLL 3 IoCs
Processes:
recdisc.exerdpshell.exesessionmsg.exepid Process 4600 recdisc.exe 1960 rdpshell.exe 3296 sessionmsg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pjlpxjignwwhtsp = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\Managed\\WORDDO~1\\v83iS\\rdpshell.exe" -
Processes:
sessionmsg.exerundll32.exerecdisc.exerdpshell.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
description pid Process procid_target PID 3536 wrote to memory of 1920 3536 86 PID 3536 wrote to memory of 1920 3536 86 PID 3536 wrote to memory of 864 3536 88 PID 3536 wrote to memory of 864 3536 88 PID 3536 wrote to memory of 4600 3536 89 PID 3536 wrote to memory of 4600 3536 89 PID 3536 wrote to memory of 2872 3536 90 PID 3536 wrote to memory of 2872 3536 90 PID 3536 wrote to memory of 1960 3536 91 PID 3536 wrote to memory of 1960 3536 91 PID 3536 wrote to memory of 4528 3536 92 PID 3536 wrote to memory of 4528 3536 92 PID 3536 wrote to memory of 3296 3536 93 PID 3536 wrote to memory of 3296 3536 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ec087fb5c9ac0a2ed26f817ccbe872a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
C:\Windows\system32\Narrator.exeC:\Windows\system32\Narrator.exe1⤵PID:1920
-
C:\Users\Admin\AppData\Local\Um6nbLk\Narrator.exeC:\Users\Admin\AppData\Local\Um6nbLk\Narrator.exe1⤵
- Executes dropped EXE
PID:4620
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵PID:864
-
C:\Users\Admin\AppData\Local\ct35MDqh\recdisc.exeC:\Users\Admin\AppData\Local\ct35MDqh\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4600
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:2872
-
C:\Users\Admin\AppData\Local\x3RiHH\rdpshell.exeC:\Users\Admin\AppData\Local\x3RiHH\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1960
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵PID:4528
-
C:\Users\Admin\AppData\Local\QLn4ah71c\sessionmsg.exeC:\Users\Admin\AppData\Local\QLn4ah71c\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3296
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD568eca9bac52fefe618ad8da74154c027
SHA14ec4ce4c25f675bb1a20b4f02759621df8f9d3a9
SHA256e7ca4ce5ed4a99b6a332bc2a621d2a292b220104b35fc5ebf98f897f8c6f1afc
SHA512ddc429c011e32d144c05bb7c77770fed3b19f3ccacc9981497bdaacaa3e7f388c4c9801bf21adb8485e26381354c51e3d1def691817862cfe1784ba5c484b694
-
Filesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
Filesize
521KB
MD5d92defaa4d346278480d2780325d8d18
SHA16494d55b2e5064ffe8add579edfcd13c3e69fffe
SHA25669b8c93d9b262b36e2bdc223cc0d6e312cc471b49d7cc36befbba1f863a05d83
SHA512b82c0fbc07361e4ad6e4ab171e55e1e41e9312ba995dce90696ca90f734f5d1ea11371ca046e8680ea566a1c2e0643ab86f1f6dcf6cbd05aed8448425a2830b5
-
Filesize
1.2MB
MD599d4d810785e01404e15acd5142064ec
SHA15315ea4e3335bafcbfb143a372968be5bd1dbdfd
SHA256f8002b77ade1bbed4313465e7d33c858ba6a36cb78e9b2835c82042fac868501
SHA512aef812f9ddbea1ab9886eb79dfa812d4c9cc75746e5834ec159fd2707e0f0cd0dc04ffbe808c45b842d5134f941c3a61c34ad75083c61c90cff34e5b6775096f
-
Filesize
193KB
MD518afee6824c84bf5115bada75ff0a3e7
SHA1d10f287a7176f57b3b2b315a5310d25b449795aa
SHA2560787b37cf197595b8149ffe3784f9c59eacde3616011f185513ff5c075a5ac4e
SHA512517356165b401dbebf15437d3b17746aef5a6a4cc62a0afe45966abc92b4cf377eee4514a36ee28b1e88e55a22a2f8a6c997df45971e7f354b66ac7d9e141845
-
Filesize
1.2MB
MD5d82630c74a6f56395ab90e9c456ee911
SHA1555e8fe14d0373668f5d5ff9280bacaf6c5bdb34
SHA256e5aae55bbfabb29bdea35a1765feb47e8bd15571fe423ff2c5e073287e796c34
SHA5128f8fdaeb980df84e2a5e6c1ccf23a75b4cc4d4c6a93f4bc167b8e6115226ca3e2ea1bfc2a8b8ae5d3e6507ab4ba3ba714a64533ac3a7a770e76b656e58fa986d
-
Filesize
468KB
MD5428066713f225bb8431340fa670671d4
SHA147f6878ff33317c3fc09c494df729a463bda174c
SHA256da6c395a2018d3439ad580a19e6a1ca5ff29ef9074411ee9f9f1b0a6365dfebd
SHA512292aad2762ae4dc519c69411aa114a29894f60ffac103813db4946f2fac4f5a166f66523c421529d6847c0882d8ab467392ee8da1e3a4fca0d6d4e6ebda5b737
-
Filesize
1KB
MD5f573fff362bbd3b2390ef7050e3cd57f
SHA1bfa72133d8bcf4b53e783d36ca598e9c4bec04bc
SHA2566731eb0c4745adc545d1dc3560c81ecdc2dbb92dd0fc44af6d7c0ce84c312703
SHA512ec47e8a50a462a5020d97140f9dedf981790539ea270cb8345a87c3aeb60099a250abd170b9a178593cee4e655b3f8472038c7f55667aac0c679144bd4b76df9