Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
af5c2d09865cacfddffbd020fab2f575_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
af5c2d09865cacfddffbd020fab2f575_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
af5c2d09865cacfddffbd020fab2f575
-
SHA1
403d2773b863288241f94f736194c5e014871c4e
-
SHA256
8d46559c1484cdb308e3dbf6daf26b638c4a1f9c5b7f1ae5b45b1eed697b7f05
-
SHA512
bb376f1b674507dcc41c6a8b30fd8926410adfdbb3a6f8dd9b999b90402d8a19f8499266d3c1d3305fe40d2d7095cef2e34a1f10ccfd6a73d71dd3b54eec156e
-
SSDEEP
24576:HuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:p9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3516-4-0x0000000008250000-0x0000000008251000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
bdeunlock.exeWFS.exedxgiadaptercache.exepid Process 968 bdeunlock.exe 4604 WFS.exe 3920 dxgiadaptercache.exe -
Loads dropped DLL 4 IoCs
Processes:
bdeunlock.exeWFS.exedxgiadaptercache.exepid Process 968 bdeunlock.exe 4604 WFS.exe 3920 dxgiadaptercache.exe 3920 dxgiadaptercache.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zsovh = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\6gVX\\WFS.exe" -
Processes:
WFS.exedxgiadaptercache.exerundll32.exebdeunlock.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dxgiadaptercache.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdeunlock.exe -
Modifies registry class 1 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 3404 rundll32.exe 3404 rundll32.exe 3404 rundll32.exe 3404 rundll32.exe 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3516 3516 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3516 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3516 wrote to memory of 1316 3516 95 PID 3516 wrote to memory of 1316 3516 95 PID 3516 wrote to memory of 968 3516 96 PID 3516 wrote to memory of 968 3516 96 PID 3516 wrote to memory of 2932 3516 97 PID 3516 wrote to memory of 2932 3516 97 PID 3516 wrote to memory of 4604 3516 98 PID 3516 wrote to memory of 4604 3516 98 PID 3516 wrote to memory of 1524 3516 99 PID 3516 wrote to memory of 1524 3516 99 PID 3516 wrote to memory of 3920 3516 100 PID 3516 wrote to memory of 3920 3516 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af5c2d09865cacfddffbd020fab2f575_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
C:\Windows\system32\bdeunlock.exeC:\Windows\system32\bdeunlock.exe1⤵PID:1316
-
C:\Users\Admin\AppData\Local\J63\bdeunlock.exeC:\Users\Admin\AppData\Local\J63\bdeunlock.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:968
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵PID:2932
-
C:\Users\Admin\AppData\Local\6UbN\WFS.exeC:\Users\Admin\AppData\Local\6UbN\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4604
-
C:\Windows\system32\dxgiadaptercache.exeC:\Windows\system32\dxgiadaptercache.exe1⤵PID:1524
-
C:\Users\Admin\AppData\Local\X4eW\dxgiadaptercache.exeC:\Users\Admin\AppData\Local\X4eW\dxgiadaptercache.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD53cbc8d0f65e3db6c76c119ed7c2ffd85
SHA1e74f794d86196e3bbb852522479946cceeed7e01
SHA256e23e4182efe7ed61aaf369696e1ce304c3818df33d1663872b6d3c75499d81f4
SHA51226ae5845a804b9eb752078f1ffa80a476648a8a9508b4f7ba56c94acd4198f3ba59c77add4feb7e0420070222af56521ca5f6334f466d5db272c816930513f0a
-
Filesize
1.2MB
MD529517f5be0fef925292fa85b0132b669
SHA18bcd62573037fdb968f35dab1ecc11cf312234d5
SHA2565404477dfa07a145a7d218d66a4c4ee3d604a3d630bc1cdda384e04324176fd4
SHA512121718006b81ae41c50cb056d967f864dff96ec33145f2ce92862876e0f147640d4bae9c8bec15f1e6d71a658da05b6f5942d1b045e9d10dd7f6807b415515ed
-
Filesize
1.2MB
MD53ea01c6c05c497232757c05cbb7c002e
SHA110d0c053b8cd98e9cfd182bd558908c98acff596
SHA256f03f5c3de2384c0a4b5e90e2c7b2cd896cd6293b35b9a9f91a452c5835621198
SHA512ea72dffcc2e5c63a8ff7f5f1e01d184293a2e2bc2cb881a106138716fa8309e3939faf26498c25376c9456c4e865eb3f08149108e57e416b78be1db9bca38f93
-
Filesize
279KB
MD5fef5d67150c249db3c1f4b30a2a5a22e
SHA141ca037b0229be9338da4d78244b4f0ea5a3d5f3
SHA256dcfdd67bf3244ff86cadaaea50b43cce5479014ea2021c0c2fb40b7c856e5603
SHA5124ded9ca87d9d30c31ab2baededaa6e26681741ea1742d80c318173536c643a01bc049e03a03c3b45b3cb8860464a855830e12e87670503e65eedcdd5e9b2d1e7
-
Filesize
1.2MB
MD56675b69009f3ee24acfd57a76220ca18
SHA1862384dccb616338955f759b238200ff4e69586c
SHA256326d8555ac4cbda78a2e7b9989bd6ded6e6b5b2c6d2d95e13f390c3933a78803
SHA512512363dcc9356a569eadd2c108e5074b99e783004960430a2347114f7bce52c4228427652a7d3c96652ef2d7b59173501562fa894767473d352d90d60ee5cfb6
-
Filesize
230KB
MD5e62f89130b7253f7780a862ed9aff294
SHA1b031e64a36e93f95f2061be5b0383069efac2070
SHA2564bea9f741fe4ca9d6262477849896b9fa6377326d11af044561c31bde2d994b5
SHA51205649d38a0b5d825bb8442549427b0ff77b139c9dd297b04d6c0fb1415504c95ed750cd79efea2ff514abfc5d1003e6251a3cd871d352dcea06be0cdeb0304f7
-
Filesize
1KB
MD5b49d1416dcbc742b38608a48c8ad35a2
SHA14082b94df5e7fffd8c6e326b9f9063afc745aca7
SHA2560f5f63a1f359dec7b22c5e2a6537df8b6109140ac1c6ffd50ede592a321a4af8
SHA51240541f3ac558afec63d4cded096498bc7d02b1e771831e037d598af7f4e76f226a62494e6038ee019d71887f0adf40425da65836f8d4d16c9fa35eba7e2d4190