Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
a26e9ff518e0a7dcb126011e6236057a_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
a26e9ff518e0a7dcb126011e6236057a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a26e9ff518e0a7dcb126011e6236057a
-
SHA1
e091c8effd602b07c71fc1a3aa7bf3ea81302b0f
-
SHA256
fd8a212a919eac3265b57d306f28a39c130b445c81776bec3488c009dad0b51f
-
SHA512
9ad562df0826fb24e9aecf56a22bda8b666c7820e177e686ab2a7ef32b4d6081f1de7dc855fec328d026bf7bb6fee458b8cb46203481604e9b1d996daa0971b5
-
SSDEEP
24576:OuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:u9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3576-4-0x0000000002A50000-0x0000000002A51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 4000 RecoveryDrive.exe 2124 PresentationSettings.exe 2412 mblctr.exe -
Loads dropped DLL 3 IoCs
pid Process 4000 RecoveryDrive.exe 2124 PresentationSettings.exe 2412 mblctr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qebzqfuc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\Y511P5\\PresentationSettings.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RecoveryDrive.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 rundll32.exe 1592 rundll32.exe 1592 rundll32.exe 1592 rundll32.exe 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found 3576 Process not Found -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found Token: SeShutdownPrivilege 3576 Process not Found Token: SeCreatePagefilePrivilege 3576 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3576 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3576 wrote to memory of 556 3576 Process not Found 94 PID 3576 wrote to memory of 556 3576 Process not Found 94 PID 3576 wrote to memory of 4000 3576 Process not Found 95 PID 3576 wrote to memory of 4000 3576 Process not Found 95 PID 3576 wrote to memory of 1644 3576 Process not Found 96 PID 3576 wrote to memory of 1644 3576 Process not Found 96 PID 3576 wrote to memory of 2124 3576 Process not Found 97 PID 3576 wrote to memory of 2124 3576 Process not Found 97 PID 3576 wrote to memory of 1120 3576 Process not Found 98 PID 3576 wrote to memory of 1120 3576 Process not Found 98 PID 3576 wrote to memory of 2412 3576 Process not Found 99 PID 3576 wrote to memory of 2412 3576 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a26e9ff518e0a7dcb126011e6236057a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
C:\Windows\system32\RecoveryDrive.exeC:\Windows\system32\RecoveryDrive.exe1⤵PID:556
-
C:\Users\Admin\AppData\Local\tr5tLMK\RecoveryDrive.exeC:\Users\Admin\AppData\Local\tr5tLMK\RecoveryDrive.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4000
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵PID:1644
-
C:\Users\Admin\AppData\Local\Jlkf\PresentationSettings.exeC:\Users\Admin\AppData\Local\Jlkf\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2124
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:1120
-
C:\Users\Admin\AppData\Local\PPk5P\mblctr.exeC:\Users\Admin\AppData\Local\PPk5P\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5790799a168c41689849310f6c15f98fa
SHA1a5d213fc1c71a56de9441b2e35411d83770c01ec
SHA2566e59ab1a0b4ac177dc3397a54afcf68fcea3c1ee72c33bd08c89f04a6dac64b8
SHA5128153b79d4681f21ade7afe995841c386bff8e491ad347f8e7c287df5f9053cae7458e273339146d9a920ceaa2ba0f41cc793d7b2c0fa80efbb41477d39470866
-
Filesize
1.2MB
MD584e82667305e08da3900835e2341b28c
SHA14074a00eac1e6b861a47464b201d60c83b2e543d
SHA256ff87027fdfe8e22474fff7cebe1ff32f214ee1b4d8d45fa5d2027f328cbd38a1
SHA512f505220fc37d498489449b797f38a0e947371c8124be1c9fea04ff39a47182836c9226432bf5d2ed96a310fe50a4016412a87736a796844aa5b9aa872f7ad6db
-
Filesize
1.2MB
MD5b236ed5df38947c91dbca6797b78a815
SHA1ffc61cb833561a9856a75304a169e7d55efe6428
SHA256eafac8a297afe9d038ea794cbf3b18591204edc7cdbd3d65133480c7b8d89f1b
SHA512700e61ff7214a4c5830ee609f65c9c0d41fc4b91358badad111bf0279bf04baca9f88cbdb2c285e2dd9063b5ccceda7eaaddf46a08fa940f1a0a9b69737d0e85
-
Filesize
790KB
MD5d3db14eabb2679e08020bcd0c96fa9f6
SHA1578dca7aad29409634064579d269e61e1f07d9dd
SHA2563baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69
SHA51214dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe
-
Filesize
911KB
MD5b9b3dc6f2eb89e41ff27400952602c74
SHA124ae07e0db3ace0809d08bbd039db3a9d533e81b
SHA256630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4
SHA5127906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe
-
Filesize
1.2MB
MD5494811ad15871f11e9b77fabf43f6072
SHA15dff8b17b6b21a71275b4ae91f34de34952517b9
SHA2567ed9907c5b4817f46202db6a648baa050341fa15b085a2dca0868cf36c822446
SHA5127abb3e5eeb8e2cffbd37efa0334e4165051b05aa7c9f5b3ed6ce15d7b650f0515327c6b5c867a9d8f08680a6faf4f2ec93e485ac6a15f150a44965c8d19bb69f
-
Filesize
1KB
MD5c1299cecac225020b8a9e3ba24d5bb7e
SHA1ec88faec0d21ae0ec9c033c00c53cdaa83f692bb
SHA2566887ea3bc9b6f368ab3f0bda59cce0fd4b857d1d6b933161d04deaa7bd3780f1
SHA512de9d7040d960b7f883651568505ad9febde44e073e29de5c961d8aed53154db9829fbc4c273d030cd812ebc168bc72133614393cb2ea1acb971c95a5b1bcf88a