Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
a20721654c3fced2cf5ecc9bed5fd3a3_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
a20721654c3fced2cf5ecc9bed5fd3a3_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a20721654c3fced2cf5ecc9bed5fd3a3
-
SHA1
e1bc4896d120d6ebaf569f6c0a1f8f3fe3b2ae2b
-
SHA256
9d825d941408f6e8d7d47ced824b3e78a5346d0bc899f41ea51d53abbe5d5a13
-
SHA512
434b92c682705ea985f15a39d6771865d3449fea6cd6941604dfce800d95285833ba3b0532d088497867032d6e8680288302acbe866229822280dbc00c940211
-
SSDEEP
24576:CuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:K9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3428-4-0x0000000007440000-0x0000000007441000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
slui.exemsra.exeSystemPropertiesDataExecutionPrevention.exepid Process 5016 slui.exe 3916 msra.exe 632 SystemPropertiesDataExecutionPrevention.exe -
Loads dropped DLL 3 IoCs
Processes:
slui.exemsra.exeSystemPropertiesDataExecutionPrevention.exepid Process 5016 slui.exe 3916 msra.exe 632 SystemPropertiesDataExecutionPrevention.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tdfoxulv = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\d3xZRA\\msra.exe" -
Processes:
slui.exemsra.exeSystemPropertiesDataExecutionPrevention.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe -
Modifies registry class 1 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid Process 3520 regsvr32.exe 3520 regsvr32.exe 3520 regsvr32.exe 3520 regsvr32.exe 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3428 Token: SeCreatePagefilePrivilege 3428 Token: SeShutdownPrivilege 3428 Token: SeCreatePagefilePrivilege 3428 Token: SeShutdownPrivilege 3428 Token: SeCreatePagefilePrivilege 3428 Token: SeShutdownPrivilege 3428 Token: SeCreatePagefilePrivilege 3428 Token: SeShutdownPrivilege 3428 Token: SeCreatePagefilePrivilege 3428 Token: SeShutdownPrivilege 3428 Token: SeCreatePagefilePrivilege 3428 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3428 3428 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3428 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3428 wrote to memory of 2852 3428 95 PID 3428 wrote to memory of 2852 3428 95 PID 3428 wrote to memory of 5016 3428 96 PID 3428 wrote to memory of 5016 3428 96 PID 3428 wrote to memory of 2760 3428 97 PID 3428 wrote to memory of 2760 3428 97 PID 3428 wrote to memory of 3916 3428 98 PID 3428 wrote to memory of 3916 3428 98 PID 3428 wrote to memory of 4828 3428 99 PID 3428 wrote to memory of 4828 3428 99 PID 3428 wrote to memory of 632 3428 100 PID 3428 wrote to memory of 632 3428 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a20721654c3fced2cf5ecc9bed5fd3a3_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2852
-
C:\Users\Admin\AppData\Local\O3qx\slui.exeC:\Users\Admin\AppData\Local\O3qx\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5016
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:2760
-
C:\Users\Admin\AppData\Local\Xmnu8CdH\msra.exeC:\Users\Admin\AppData\Local\Xmnu8CdH\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3916
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵PID:4828
-
C:\Users\Admin\AppData\Local\7lWqO\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\7lWqO\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52d08559edfe0940affb5e80da5811e71
SHA12c7dc161e0844e959a7e033cf17891f680538311
SHA256a9001dbba812e49b20a593597c4ec87d935cd4ee086ce42d56434f0a5b585dc6
SHA512d825f973cd8d9b5cd392ad2bea7a9713693f646c594c0edbecdcd4ab8fe6b0f4f6517a7766adc03e9a06a95186049e36e9a335b2ce62b02c0805242db762cf22
-
Filesize
82KB
MD5de58532954c2704f2b2309ffc320651d
SHA10a9fc98f4d47dccb0b231edf9a63309314f68e3b
SHA2561f810658969560f6e7d7a14f71d1196382e53b984ca190fa9b178ac4a32acfb3
SHA512d4d57cc30d9079f4e9193ba42631e8e53d86b22e9c655d7a8c25e5be0e5e1d6dfff4714ddc23e3e392809d623b4f8d43c63893f74c325fc77459ac03c7a451ed
-
Filesize
1.2MB
MD5749fff174e528e1e4509061c859de73f
SHA17fd38291c926c9ad40e8a9a1a9a3cf940b91217c
SHA2565ad67f557534ab2b5eb8dbe768d53a014305d7030003d59082a511d0df1a4e9f
SHA51281d64faef0644c6c6c3af30f1447750eaf81817cbec048fc85504561b317af97a7c0a6af54a96e97505daa25131b3b4decac4b0e466493c8fb30b869c8b0c874
-
Filesize
534KB
MD5eb725ea35a13dc18eac46aa81e7f2841
SHA1c0b3304c970324952e18c4a51073e3bdec73440b
SHA25625e7624d469a592934ab8c509d12c153c2799e604c2a4b8a83650a7268577dff
SHA51239192a1fad29654b3769f007298eff049d0688a3cb51390833ec563f44f9931cd3f6f8693db37b649b061b5aab379b166c15dade56d0fc414375243320375b26
-
Filesize
1.2MB
MD51e2c6f94e7932c7f2c7b195e7bd6d9a5
SHA14106f65bae93c90b1d47c62088ff9a27f4de0ef3
SHA25680135ddcc40d824952777a3ed45004ef793f1a16163ff3da37f8fe2304658939
SHA512f65affbdc4f6ed9f92d665ac8164e8b116f55c26f50a77d9f6128c55739a93a95af1fc93645f8d314a5674e0bd70d3c7b1f875a4c9c074fad80b6ec8adf76b3b
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
1KB
MD545e949224489066b79280346a43c70bc
SHA14c50439a23af663a3a0e01a993fdfec4f18c31e9
SHA2564bf3e2af8386f12a7f7384a9a6402706d21ae8b07780b549c3123b2f93890419
SHA512c60130d002fb80cc2baaf9dd7db10318e74fd040227ad2c4b630c50d2d9f6da3875699bcc87389f23cf4a99a9f54309628f9d9234863976006c1fb83aebe1d0e