Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
a908ca52629cfab8057cb8d662b488b1_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
a908ca52629cfab8057cb8d662b488b1_JaffaCakes118.dll
-
Size
909KB
-
MD5
a908ca52629cfab8057cb8d662b488b1
-
SHA1
29d811439833907b69f1a6c2b09c95f499f52038
-
SHA256
139721b2a97521b2eea00f077fd1e95eb0859296937b1579b0223e8e16b5c628
-
SHA512
a2bb59d5211b2e08e4b277c78c9470580828726efcf39548a7b6b9ca51afa12c487abdfbd7762f45b2f7be2bdad357d9026c2a59f8558625c36f1508cf8db29b
-
SSDEEP
12288:Late3r/6VSBuehNcvwh8zqv8gxLBkVHUR8LlRYchYN7QBAs2bh:LN3r/fHhSv3zqvRLBCHUyj7BA
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3364-2-0x00007FFAEC350000-0x00007FFAEC439000-memory.dmp dridex_ldr_dmod behavioral2/memory/3524-35-0x0000000140000000-0x00000001400E9000-memory.dmp dridex_ldr_dmod behavioral2/memory/3524-24-0x0000000140000000-0x00000001400E9000-memory.dmp dridex_ldr_dmod behavioral2/memory/3524-18-0x0000000140000000-0x00000001400E9000-memory.dmp dridex_ldr_dmod behavioral2/memory/3364-38-0x00007FFAEC350000-0x00007FFAEC439000-memory.dmp dridex_ldr_dmod behavioral2/memory/5000-46-0x00007FFAE7FF0000-0x00007FFAE80E0000-memory.dmp dridex_ldr_dmod behavioral2/memory/5000-51-0x00007FFAE7FF0000-0x00007FFAE80E0000-memory.dmp dridex_ldr_dmod behavioral2/memory/3112-62-0x00007FFAE7FF0000-0x00007FFAE80DA000-memory.dmp dridex_ldr_dmod behavioral2/memory/3112-68-0x00007FFAE7FF0000-0x00007FFAE80DA000-memory.dmp dridex_ldr_dmod behavioral2/memory/5040-85-0x00007FFAE7FF0000-0x00007FFAE80E0000-memory.dmp dridex_ldr_dmod -
resource yara_rule behavioral2/memory/3524-4-0x0000000008450000-0x0000000008451000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 5000 eudcedit.exe 3112 msra.exe 5040 DevicePairingWizard.exe -
Loads dropped DLL 3 IoCs
pid Process 5000 eudcedit.exe 3112 msra.exe 5040 DevicePairingWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Veuhujsfce = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\DOCUME~1\\batnyxgy\\msra.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3364 regsvr32.exe 3364 regsvr32.exe 3364 regsvr32.exe 3364 regsvr32.exe 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3524 Process not Found 3524 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3524 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3524 wrote to memory of 3556 3524 Process not Found 94 PID 3524 wrote to memory of 3556 3524 Process not Found 94 PID 3524 wrote to memory of 5000 3524 Process not Found 95 PID 3524 wrote to memory of 5000 3524 Process not Found 95 PID 3524 wrote to memory of 3416 3524 Process not Found 96 PID 3524 wrote to memory of 3416 3524 Process not Found 96 PID 3524 wrote to memory of 3112 3524 Process not Found 97 PID 3524 wrote to memory of 3112 3524 Process not Found 97 PID 3524 wrote to memory of 1568 3524 Process not Found 98 PID 3524 wrote to memory of 1568 3524 Process not Found 98 PID 3524 wrote to memory of 5040 3524 Process not Found 99 PID 3524 wrote to memory of 5040 3524 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a908ca52629cfab8057cb8d662b488b1_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:3556
-
C:\Users\Admin\AppData\Local\HErhszWN\eudcedit.exeC:\Users\Admin\AppData\Local\HErhszWN\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5000
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:3416
-
C:\Users\Admin\AppData\Local\9xro5K\msra.exeC:\Users\Admin\AppData\Local\9xro5K\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3112
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:1568
-
C:\Users\Admin\AppData\Local\TMq\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\TMq\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
910KB
MD5f923d4e02f2f4167274c466a67cda81d
SHA1142c9a46f1af6d07d9a768b06617001352d1d709
SHA25612acba0bdd3b3fce7d989dc47bf933584b918d63997013d85a10a0fd089423e3
SHA5124f40131aa84c8d591d41b16d92c14d7cb058801a03d1b09d3af68d8db5c8092fd76392262ef46d45b35aa075d8c4bb8f0016613b421bd322d99ccc793899f916
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
937KB
MD50e390087ddbc66b7cbefa1fb442bbb7d
SHA112b03bffbff75248c66d98024b5f90edbc7aa194
SHA2565f9489f1e1bc5832c6d6bd366f6e2428042dbd9ec0ccdb01febb34c0422d38cc
SHA512eaef7f3bda24e3ceee87ae0110e32e877440ef5fd59424363ae2f4e4fa9c4ee085c0b257c8e730e5691a25ebea085c39fd8ea307513c9a2666c437d6a1be7898
-
Filesize
365KB
MD5a9de6557179d371938fbe52511b551ce
SHA1def460b4028788ded82dc55c36cb0df28599fd5f
SHA25683c8d1a7582b24b4bbc0d453c813487185c2b05c483bd1759ef647a7e7e92dfe
SHA5125790cac8dae16a785b48f790e6645b137f211c1587fb64ea88e743b846ff3a886324afcfef4bebc61f869023b9a22ba925c461dfb2e12497b70f501e6b79153c
-
Filesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
Filesize
937KB
MD543b3bce31fc1937bbf0950ff0b36f8b8
SHA15fa022657ab0fffb375c665955691bb68a149c0b
SHA25629cf2c79719d413801e47edb7dd000c4ced2e030870092e58d0145bd53105877
SHA51249f1f40187569eb9e93e2457df9f4ee772d1efd3831acbf2fdc21a374551efa783991dd59b7ab19dc88551a3cf370e983433a271b50659c702c5e70cb1e57d8b
-
Filesize
1KB
MD586a952590657ef65082aea285dad2216
SHA1950a2e2900f54e10972ac72e8b5a24ccfb1c2abf
SHA25607016cbcf2dd14e8820ccca59de8a178e32684273e3f92a000091bed2594879a
SHA51204049783a88889857a3b2db840dc3149137ac15fa5f464b996a40b4549457b5973d952b29b0e0017200615e3cfb5aa1628fbf13c249fb573987c6b6ba5087e09