Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
85ca9b6e2d3628cea4badad665e74407_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85ca9b6e2d3628cea4badad665e74407_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
85ca9b6e2d3628cea4badad665e74407_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
85ca9b6e2d3628cea4badad665e74407
-
SHA1
951a6bd5f11a3e473a5e13b4cd9d76e1d8128fa5
-
SHA256
09fb14c04c646802ded6085bf57fd6afd60d168d570cfed4db4ff7e820d0db72
-
SHA512
b3fa6263f5fd2e72dd20b36100e2272cb823f899123525bb7176acfeb481aadde026ab5edf8163a51aba7236008cd3ec3aa3419f0d779052ed35b23975c1cd66
-
SSDEEP
24576:QuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N9t:A9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3428-4-0x0000000002470000-0x0000000002471000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
pid Process 4208 Narrator.exe 1332 PresentationHost.exe 3064 Utilman.exe 3632 wusa.exe -
Loads dropped DLL 3 IoCs
pid Process 1332 PresentationHost.exe 3064 Utilman.exe 3632 wusa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zsovh = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\UserData\\SAYNPG~1\\Utilman.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 556 rundll32.exe 556 rundll32.exe 556 rundll32.exe 556 rundll32.exe 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3428 Process not Found 3428 Process not Found -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3428 wrote to memory of 3764 3428 Process not Found 94 PID 3428 wrote to memory of 3764 3428 Process not Found 94 PID 3428 wrote to memory of 2656 3428 Process not Found 96 PID 3428 wrote to memory of 2656 3428 Process not Found 96 PID 3428 wrote to memory of 1332 3428 Process not Found 97 PID 3428 wrote to memory of 1332 3428 Process not Found 97 PID 3428 wrote to memory of 4124 3428 Process not Found 98 PID 3428 wrote to memory of 4124 3428 Process not Found 98 PID 3428 wrote to memory of 3064 3428 Process not Found 99 PID 3428 wrote to memory of 3064 3428 Process not Found 99 PID 3428 wrote to memory of 4624 3428 Process not Found 100 PID 3428 wrote to memory of 4624 3428 Process not Found 100 PID 3428 wrote to memory of 3632 3428 Process not Found 101 PID 3428 wrote to memory of 3632 3428 Process not Found 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85ca9b6e2d3628cea4badad665e74407_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:556
-
C:\Windows\system32\Narrator.exeC:\Windows\system32\Narrator.exe1⤵PID:3764
-
C:\Users\Admin\AppData\Local\uxq\Narrator.exeC:\Users\Admin\AppData\Local\uxq\Narrator.exe1⤵
- Executes dropped EXE
PID:4208
-
C:\Windows\system32\PresentationHost.exeC:\Windows\system32\PresentationHost.exe1⤵PID:2656
-
C:\Users\Admin\AppData\Local\kRej\PresentationHost.exeC:\Users\Admin\AppData\Local\kRej\PresentationHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1332
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵PID:4124
-
C:\Users\Admin\AppData\Local\0BYvq\Utilman.exeC:\Users\Admin\AppData\Local\0BYvq\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3064
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:4624
-
C:\Users\Admin\AppData\Local\tRMR5GSV9\wusa.exeC:\Users\Admin\AppData\Local\tRMR5GSV9\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a8db0570ec9a56781a984816cb74ea38
SHA1675bbef73d375aaa7b7fcd9ed73a346e6c77c6e8
SHA256aa526e58c93f11a613eb535f8cdd5fb30bb0944be33f914a0a1fc0f52f3c8b44
SHA512ca3b1d61826b7bec0bef223635c7cfc340dcb5bbb0d74e9cfac4b802c4c17d0cb60e8ae82edf350260e1dfccdef7d68c1bd8c3f8b9f714244700da2cd9d7cb5e
-
Filesize
123KB
MD5a117edc0e74ab4770acf7f7e86e573f7
SHA15ceffb1a5e05e52aafcbc2d44e1e8445440706f3
SHA256b5bc4fce58403ea554691db678e6c8c448310fe59990990f0e37cd4357567d37
SHA51272883f794ff585fe7e86e818d4d8c54fa9781cab6c3fac6f6956f58a016a91f676e70d14691cbe054ae7b7469c6b4783152fbb694e92b940d9e3595fe3f41d97
-
Filesize
276KB
MD5ef27d65b92d89e8175e6751a57ed9d93
SHA17279b58e711b459434f047e9098f9131391c3778
SHA25617d6dcfaced6873a4ac0361ff14f48313f270ac9c465e9f02b5c12b5a5274c48
SHA51240f46c3a131bb0388b8a3f7aee422936f6e2aa8d2cda547c43c4e7979c163d06c5aa20033a5156d3eeee5d455eeb929cbce89bcc8bb1766cbb65d7f03dd23e2e
-
Filesize
1.2MB
MD512d66d38ad30b3ade28eac3eac600744
SHA100cd45205f8f4c5c622e88451eb1679d9d5501ad
SHA25631bb8825e75f791f752ba71b89455db3b286f44dc9482bd7f83d6476f4a3b43f
SHA51296e6ca0319ae832f24a300d84224b1de14debb1938b965c5ae37d2b166ab4ff7cd9d412f0d09d6f06d008c8145253fbbc387cdff097a55885d7f9076b41919af
-
Filesize
1.2MB
MD555e6052ec8ceb7b78d859537c5c2e623
SHA16c7f074a193691ed36b37e39dab457dc21e0f245
SHA25658121de233d9e5a0009477deda694dc6c28d4d78ab867f5d382aeeebfe51fb59
SHA51201358dae11bfa55ab77949086015e965cab73a0164f31f2251f3388aa1d2cebe76df56553e4567f92da8a7a89d262a74893163f0acd8f3c646fd1cbefd77b42f
-
Filesize
309KB
MD5e43499ee2b4cf328a81bace9b1644c5d
SHA1b2b55641f2799e3fdb3bea709c9532017bbac59d
SHA2563e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb
SHA51204823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b
-
Filesize
521KB
MD5d92defaa4d346278480d2780325d8d18
SHA16494d55b2e5064ffe8add579edfcd13c3e69fffe
SHA25669b8c93d9b262b36e2bdc223cc0d6e312cc471b49d7cc36befbba1f863a05d83
SHA512b82c0fbc07361e4ad6e4ab171e55e1e41e9312ba995dce90696ca90f734f5d1ea11371ca046e8680ea566a1c2e0643ab86f1f6dcf6cbd05aed8448425a2830b5
-
Filesize
1KB
MD5f9202669d793d953764744638ec8740b
SHA1e1f0b8c966bef44c4257b7f9ad006a89907adbee
SHA256ccfe142113825ca70e084a87c38e74b629bdee82db74a38ca7d9a27595b7a8b1
SHA512ca3f4cc86a181375608eab7ba7c67faf19d139ca3849fac044a541c3c0419d11fcca7ac699e6b8b24380ada6294177cad76569f780ab00e255c8d01b2cb238db