Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
946f198f08b87a5905b23ba3874d29f8_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
946f198f08b87a5905b23ba3874d29f8_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
946f198f08b87a5905b23ba3874d29f8
-
SHA1
415cd2e62beb581b477c633373aee2f0ab850035
-
SHA256
abdd071d272c602d9eb594c38b82fab881b995e75614c0956470c44f7e1654a6
-
SHA512
7806161254fb434014babf4794ff8bf8b1f4f2727a2fabd59d84b951fdbd28787bcf6a888f55620fb78161c5094eb99e5925884e8db473c08ccf96dfa944634b
-
SSDEEP
24576:AuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:Q9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3424-4-0x0000000002850000-0x0000000002851000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
tabcal.exerdpinit.exeApplicationFrameHost.exepid Process 1904 tabcal.exe 552 rdpinit.exe 4320 ApplicationFrameHost.exe -
Loads dropped DLL 3 IoCs
Processes:
tabcal.exerdpinit.exeApplicationFrameHost.exepid Process 1904 tabcal.exe 552 rdpinit.exe 4320 ApplicationFrameHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wdtbxtklooytt = "C:\\Users\\Admin\\AppData\\Roaming\\Sun\\5C\\rdpinit.exe" -
Processes:
rundll32.exetabcal.exerdpinit.exeApplicationFrameHost.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplicationFrameHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3424 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3424 wrote to memory of 2868 3424 94 PID 3424 wrote to memory of 2868 3424 94 PID 3424 wrote to memory of 1904 3424 95 PID 3424 wrote to memory of 1904 3424 95 PID 3424 wrote to memory of 2044 3424 96 PID 3424 wrote to memory of 2044 3424 96 PID 3424 wrote to memory of 552 3424 97 PID 3424 wrote to memory of 552 3424 97 PID 3424 wrote to memory of 4328 3424 98 PID 3424 wrote to memory of 4328 3424 98 PID 3424 wrote to memory of 4320 3424 99 PID 3424 wrote to memory of 4320 3424 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\946f198f08b87a5905b23ba3874d29f8_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:2868
-
C:\Users\Admin\AppData\Local\ESSf\tabcal.exeC:\Users\Admin\AppData\Local\ESSf\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1904
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵PID:2044
-
C:\Users\Admin\AppData\Local\qRz\rdpinit.exeC:\Users\Admin\AppData\Local\qRz\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:552
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe1⤵PID:4328
-
C:\Users\Admin\AppData\Local\H2D\ApplicationFrameHost.exeC:\Users\Admin\AppData\Local\H2D\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD53600787af4a1e1dffafffdff20ec37c0
SHA192147f59cded6c37775d0dfe23eaadae25d94562
SHA256575870b70444c759e267a75ea69c5684f0dd137fd0391fcbbaaf674343015d47
SHA51217935022f39601d0ba61ca7dc8d345b811506928e5ad5ce6a36a5b9a198bbd98559c953cc19d9751502983f1d1e3e8c7fdf561f7079721cf9c80490e9f519b14
-
Filesize
84KB
MD540f4014416ff0cbf92a9509f67a69754
SHA11798ff7324724a32c810e2075b11c09b41e4fede
SHA256f31b4c751dbca276446119ba775787c3eb032da72eabcd40ad96a55826a3f33c
SHA512646dfe4cfe90d068c3da4c35f7053bb0f57687875a0f3469c0683e707306e6a42b0baca3e944d78f9be5c564bb0600202c32c223a770f89d3e2b07a24673c259
-
Filesize
76KB
MD5d58a8a987a8dafad9dc32a548cc061e7
SHA1f79fc9e0ab066cad530b949c2153c532a5223156
SHA256cf58e424b86775e6f2354291052126a646f842fff811b730714dfbbd8ebc71a4
SHA51293df28b65af23a5f82124ba644e821614e2e2074c98dbb2bd7319d1dfe9e2179b9d660d7720913c79a8e7b2f8560440789ad5e170b9d94670589885060c14265
-
Filesize
1.2MB
MD5d5b423b806c4f350776d9147642078e4
SHA11d8ab9c9d0e836a9031871f388615259ab9dd276
SHA256b1683e71eca38b26e12073452c2bd6f7883e1e6e9a87ebabb85f21e9f9b83228
SHA5128b0eccc2c60a65887ae7c91eca1d3dfe527a73a3e424eba519d14f5fbfab2917ec5677e6dde55e059aa450c71ad45a6f49dc09ddc835e8665339267d219a76d2
-
Filesize
1.2MB
MD559c8c56efe96c753678b9982db977bbf
SHA1b47290957b4fc39e55712a70a827d25fba5b8429
SHA25699e37ed23fe3e35a697ad6cae0068901612eaab3e83c97b3c279895f1eca9328
SHA5128ab12a63463e8f17cef77f9715a4b59fcebc11897d10f33d0e3b1c092138af0447d2aba14bc8f7f756793c8fd1b59beef233397c76672453c7fff28e7ed77ae9
-
Filesize
343KB
MD5b0ecd76d99c5f5134aeb52460add6f80
SHA151462078092c9d6b7fa2b9544ffe0a49eb258106
SHA25651251863097f7c80ef59606152ec59e7522881c8e3886c194c43f56bcab92e1b
SHA51216855c7db48b26297c78d37d52ad03f6af0f5a58e333e17ad83b34f5e8b200c5517c6481043af0ecf1b962af2378f38600bd968592f4e1018b5a1b9400adb367
-
Filesize
1KB
MD51e49c70f6dd7af33e1ded02924dcb9bc
SHA1c2f42f87e15bddfb4d7698cb8dc2f2e81285a2a8
SHA2566030babd84a57d6d261198f3ea33c62bc6e46d8f6df4cad97642a7d6b1351550
SHA512241b26fbf6352d8f25c500b6136eec351559f447d08ef329e0617659a2ffccabac9bdabe52ec78e1b73604907d224f701af9c33610d1b1d257092c9be8eb7293