Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
82ad4f64c89c3bbbd8cd8e53607071ea_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
82ad4f64c89c3bbbd8cd8e53607071ea_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
82ad4f64c89c3bbbd8cd8e53607071ea
-
SHA1
c93046e3777bdce827ecc58e9de0420ddc1cd5a1
-
SHA256
a594d78a5f1c9a6ca8d3b108513c84fcf4d12819dee46890074d5b0688120ac1
-
SHA512
aed739f5ebac5f5a5c34632e451d0a0c650227650361fe052dcdd7ee76466ad96c3df3eaeac66ddb98a09c7cf9a3ff717897b5e0ff6d8dfd03b86992bc29236d
-
SSDEEP
24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:G9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3544-4-0x0000000000F30000-0x0000000000F31000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1044 rdpinput.exe 1624 wlrmdr.exe 1808 recdisc.exe -
Loads dropped DLL 3 IoCs
pid Process 1044 rdpinput.exe 1624 wlrmdr.exe 1808 recdisc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3089151618-2647890268-2710988337-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Apmppbkgasojkwm = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\ZdU\\wlrmdr.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wlrmdr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found 3544 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3544 wrote to memory of 1648 3544 Process not Found 86 PID 3544 wrote to memory of 1648 3544 Process not Found 86 PID 3544 wrote to memory of 1044 3544 Process not Found 87 PID 3544 wrote to memory of 1044 3544 Process not Found 87 PID 3544 wrote to memory of 3516 3544 Process not Found 88 PID 3544 wrote to memory of 3516 3544 Process not Found 88 PID 3544 wrote to memory of 1624 3544 Process not Found 89 PID 3544 wrote to memory of 1624 3544 Process not Found 89 PID 3544 wrote to memory of 468 3544 Process not Found 90 PID 3544 wrote to memory of 468 3544 Process not Found 90 PID 3544 wrote to memory of 1808 3544 Process not Found 91 PID 3544 wrote to memory of 1808 3544 Process not Found 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82ad4f64c89c3bbbd8cd8e53607071ea_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:212
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵PID:1648
-
C:\Users\Admin\AppData\Local\jUZQ8E2\rdpinput.exeC:\Users\Admin\AppData\Local\jUZQ8E2\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1044
-
C:\Windows\system32\wlrmdr.exeC:\Windows\system32\wlrmdr.exe1⤵PID:3516
-
C:\Users\Admin\AppData\Local\FBLN39GJ\wlrmdr.exeC:\Users\Admin\AppData\Local\FBLN39GJ\wlrmdr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1624
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵PID:468
-
C:\Users\Admin\AppData\Local\h7RH0Gwo\recdisc.exeC:\Users\Admin\AppData\Local\h7RH0Gwo\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD57bb275a24d98e4002b4155c8977193d6
SHA14233a650d5d6ae1122f6b4c6949a345947aa99e3
SHA256a8697471ce4ed9ddf0a40fff1ad32d87eca475786b93b3925ff64ac98559f0ad
SHA512759b1f8291985e734ecc822605cd7141a6d238e6a553986abb1368cdc9d520f2195f41b0e753e72bbd24ea9af537a736fa80b33f6dd052a953d7c6b6f9be445c
-
Filesize
66KB
MD5ef9bba7a637a11b224a90bf90a8943ac
SHA14747ec6efd2d41e049159249c2d888189bb33d1d
SHA2562fda95aafb2e9284c730bf912b93f60a75b151941adc14445ed1e056140325b1
SHA5124c1fdb8e4bf25546a2a33c95268593746f5ae2666ce36c6d9ba5833357f13720c4722231224e82308af8c156485a2c86ffd97e3093717a28d1300d3787ef1831
-
Filesize
1.2MB
MD55cf34a8e86e4c56bf053c4c98eede0ff
SHA139fb843699f59e88bada9b316d117328f808c0d6
SHA256abb6b7c71389d1dc558da184c98ed658e7a33630082dfebc3987b20451035da5
SHA512ad41d565c8be5a198983edaf241f3e5e1b16273d8c3c2358e57b34c3d610bcf5f5432a9108961f683dff52db3c995bcd4f238a20b8d003d2ab714578359dd361
-
Filesize
193KB
MD518afee6824c84bf5115bada75ff0a3e7
SHA1d10f287a7176f57b3b2b315a5310d25b449795aa
SHA2560787b37cf197595b8149ffe3784f9c59eacde3616011f185513ff5c075a5ac4e
SHA512517356165b401dbebf15437d3b17746aef5a6a4cc62a0afe45966abc92b4cf377eee4514a36ee28b1e88e55a22a2f8a6c997df45971e7f354b66ac7d9e141845
-
Filesize
1.2MB
MD52f098700b9f3075c0805959648a6d06a
SHA1da21cb446ce77536103c7b024d4c5d5ded7bd5ad
SHA256bf31cc9a318bd3a382a601f5daacca2dd076b55e958c49dc3f2d9a7bed772c07
SHA512abb702947d94f1fba180838b0968a22fcfd6789f1736e0bc4e103ecff87e3827a62b0a3b04f4d3460fc03fc321408a85be9857939976f296b679a8d0ebafe43d
-
Filesize
180KB
MD5bd99eeca92869f9a3084d689f335c734
SHA1a2839f6038ea50a4456cd5c2a3ea003e7b77688c
SHA25639bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143
SHA512355433c3bbbaa3bcb849633d45713d8a7ac6f87a025732fbe83e259ec3a0cb4eabb18239df26609453f9fc6764c7276c5d0472f11cf12d15ef806aa7594d090e
-
Filesize
1KB
MD59a0f60f0cb85525e6e9a7de39b21f012
SHA1481ef175da9d3d3fa5358e2a77216031b7084010
SHA2567bdde39507b52ff1ec4eb86256a453a3b506503fc732d7c43d67407322095d9b
SHA512bff4b1cd9aa2764413b7703b5154d312d03f7539025185705e8fede0cd7dfdab1c440e915f2a4f6edd0ba47e39ba8fbf12febd30f96678555dd065adaccfd29f