Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
8f968de65b229b07429e091da4f33aa3_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
8f968de65b229b07429e091da4f33aa3_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
8f968de65b229b07429e091da4f33aa3
-
SHA1
1be38b944d34c04a4a16a28634facd8cc3e2111f
-
SHA256
3dff0c924f277d23a655e417ad8ac99c91a0acb1c8cd28ace46edc1811051696
-
SHA512
4c22f146a252308da05553ceb86384437fe1836c3c86bd1c0f8bfc5c5bdf60ee8549cd831b9088a4a6e4aa382144766816b718acf5804f83a1130d274f46f1e5
-
SSDEEP
24576:DuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Ny:t9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3532-4-0x0000000002CC0000-0x0000000002CC1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
pid Process 2972 ie4uinit.exe 2008 SystemPropertiesProtection.exe 2556 wermgr.exe 4736 RdpSa.exe -
Loads dropped DLL 4 IoCs
pid Process 2972 ie4uinit.exe 2972 ie4uinit.exe 2008 SystemPropertiesProtection.exe 4736 RdpSa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ftxdckjforivc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\SYSTEM~1\\CGGUGS~1\\SYSTEM~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4uinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesProtection.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 regsvr32.exe 2072 regsvr32.exe 2072 regsvr32.exe 2072 regsvr32.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3532 Process not Found 3532 Process not Found -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2940 3532 Process not Found 94 PID 3532 wrote to memory of 2940 3532 Process not Found 94 PID 3532 wrote to memory of 2972 3532 Process not Found 95 PID 3532 wrote to memory of 2972 3532 Process not Found 95 PID 3532 wrote to memory of 3788 3532 Process not Found 96 PID 3532 wrote to memory of 3788 3532 Process not Found 96 PID 3532 wrote to memory of 2008 3532 Process not Found 97 PID 3532 wrote to memory of 2008 3532 Process not Found 97 PID 3532 wrote to memory of 1480 3532 Process not Found 98 PID 3532 wrote to memory of 1480 3532 Process not Found 98 PID 3532 wrote to memory of 2556 3532 Process not Found 99 PID 3532 wrote to memory of 2556 3532 Process not Found 99 PID 3532 wrote to memory of 3728 3532 Process not Found 100 PID 3532 wrote to memory of 3728 3532 Process not Found 100 PID 3532 wrote to memory of 4736 3532 Process not Found 101 PID 3532 wrote to memory of 4736 3532 Process not Found 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8f968de65b229b07429e091da4f33aa3_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵PID:2940
-
C:\Users\Admin\AppData\Local\jle4n\ie4uinit.exeC:\Users\Admin\AppData\Local\jle4n\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2972
-
C:\Windows\system32\SystemPropertiesProtection.exeC:\Windows\system32\SystemPropertiesProtection.exe1⤵PID:3788
-
C:\Users\Admin\AppData\Local\ham\SystemPropertiesProtection.exeC:\Users\Admin\AppData\Local\ham\SystemPropertiesProtection.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2008
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe1⤵PID:1480
-
C:\Users\Admin\AppData\Local\GFXi\wermgr.exeC:\Users\Admin\AppData\Local\GFXi\wermgr.exe1⤵
- Executes dropped EXE
PID:2556
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe1⤵PID:3728
-
C:\Users\Admin\AppData\Local\9FwRj5uL\RdpSa.exeC:\Users\Admin\AppData\Local\9FwRj5uL\RdpSa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD55992f5b5d0b296b83877da15b54dd1b4
SHA10d87be8d4b7aeada4b55d1d05c0539df892f8f82
SHA25632f60eabe54c4d0cd0f0ec29f48f55ca1ad097bf35097247b186fd70426f847c
SHA5124f6da913af530301da1d0638aa2635ada446ebee6e27b5059db5c2b7fe439162ac3b1a595ecf4163a093890df9ac94d9085a53d8c991e48703f9d2691326e7e6
-
Filesize
1.2MB
MD56b8996b641e1a65eb868ef0ca09a75ef
SHA13d0a11c68e833d28b3cf2bdbd4cf78110b7e59ce
SHA256347aec2af183fbcdfb7a02d2cd9633c44cdf4a10bd8c7282e47d1c856e38eb6e
SHA512e61f626ae9a5023603cb689c60446f64bd240f076624391058a06f034873448129848903c0fae57caffc36102205ec0d305f7251dc7560780410123052c965b2
-
Filesize
223KB
MD5f7991343cf02ed92cb59f394e8b89f1f
SHA1573ad9af63a6a0ab9b209ece518fd582b54cfef5
SHA2561c09759dcd31fdc81bcd6685438d7efb34e0229f1096bfd57d41ecfe614d07dc
SHA512fa3cf314100f5340c7d0f6a70632a308fcadb4b48785753310a053a510169979a89637b8b4fedf4d3690db6b8b55146e323cad70d704c4e2ede4edff5284237d
-
Filesize
1.2MB
MD50c308846b4e08e1631b2c4615204ea13
SHA1547b5764f5396b0e74c158acc8aff3938e1f5a43
SHA256347d2365c3c90efa69cbdb7c37fbb042e1b218466663afc8cdaf265c27e83340
SHA512487a89cb81db8e7eccfa5013f4be190e1bc50d0ac1b8493816c71c2062bee82d5e60903110a0e3b8dc8ae9245f59d082c8861d3a4adfe32f08308048b11a846a
-
Filesize
82KB
MD526640d2d4fa912fc9a354ef6cfe500ff
SHA1a343fd82659ce2d8de3beb587088867cf2ab8857
SHA256a8ddf1b17b0cbc96a7eaedb0003aa7b1631da09ebfe85b387f8f630222511b37
SHA51226162a3d9d4a8e3290dbcf6fe387b5c48ab1d9552aa02a38954649d877f408cb282e57580f81e15128e3a41da0eb58328d1d6253e1b57232f9a8cecdd99991dc
-
Filesize
1.2MB
MD5032aa5c656329bd9145a365226e86c02
SHA17f3d89e912d200a23205b28b60e216d06c0827a6
SHA256276570ba6ca579f8e2458700636a8d5073573c33f3b090e71ed1597ba899bb30
SHA5122417c2b03c79e26f30f13da143f8da82771867cc3a3fa4a6cf3c879f2b1c4bc2f48b802eaf278617e6de7165b63e4123cb1471fe7c00c015fb2630c7cc12101a
-
Filesize
262KB
MD5a2f0104edd80ca2c24c24356d5eacc4f
SHA18269b9fd9231f04ed47419bd565c69dc677fab56
SHA2565d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c
SHA512e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390
-
Filesize
1KB
MD599712f6901da858716c4bca4d4a11304
SHA1b5538d6b4773fdba38a7ce42e47e435d5bbe5b7a
SHA256a129d08708e81276e886fb084142e5e9ec24a0069bc7569afa8a3964a0c390ed
SHA5121f290405fb997f48231c49e5ec8b77ffbdf6ef29bdd542c3c0637776b45fc6acfecbdf5b86fdc615e3c34954c71c92c51720eefa18ce9ebb2adfa59362a0d49a