Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
afb00d38603a12de72531ad560e85254_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
afb00d38603a12de72531ad560e85254_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
afb00d38603a12de72531ad560e85254
-
SHA1
f7b662d6bfbf3821b03f572deec18a07b7e8f175
-
SHA256
c51312f6ea110b81ae4ddec3ee994b9cd14b800568ab4e0e99a903f4c77fb9aa
-
SHA512
b6993eff1aa74e7b4f03882b20759469eb807511f4c9d02fdc939a44b1ff04b7217dd80037a8caa205c9d784cad6d840a5867026f84bbd3390ad63cc12b903d2
-
SSDEEP
24576:uuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:O9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3400-4-0x0000000007430000-0x0000000007431000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2488 tabcal.exe 3828 EhStorAuthn.exe 2348 bdechangepin.exe -
Loads dropped DLL 3 IoCs
pid Process 2488 tabcal.exe 3828 EhStorAuthn.exe 2348 bdechangepin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wbdoaalrz = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\aNGE5OmI\\EHSTOR~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdechangepin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3400 Process not Found 3400 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3400 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3400 wrote to memory of 3648 3400 Process not Found 95 PID 3400 wrote to memory of 3648 3400 Process not Found 95 PID 3400 wrote to memory of 2488 3400 Process not Found 96 PID 3400 wrote to memory of 2488 3400 Process not Found 96 PID 3400 wrote to memory of 2828 3400 Process not Found 97 PID 3400 wrote to memory of 2828 3400 Process not Found 97 PID 3400 wrote to memory of 3828 3400 Process not Found 98 PID 3400 wrote to memory of 3828 3400 Process not Found 98 PID 3400 wrote to memory of 4504 3400 Process not Found 99 PID 3400 wrote to memory of 4504 3400 Process not Found 99 PID 3400 wrote to memory of 2348 3400 Process not Found 100 PID 3400 wrote to memory of 2348 3400 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\afb00d38603a12de72531ad560e85254_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:3648
-
C:\Users\Admin\AppData\Local\GxTiIj\tabcal.exeC:\Users\Admin\AppData\Local\GxTiIj\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2488
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵PID:2828
-
C:\Users\Admin\AppData\Local\zaKjgs\EhStorAuthn.exeC:\Users\Admin\AppData\Local\zaKjgs\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3828
-
C:\Windows\system32\bdechangepin.exeC:\Windows\system32\bdechangepin.exe1⤵PID:4504
-
C:\Users\Admin\AppData\Local\qg9Eg\bdechangepin.exeC:\Users\Admin\AppData\Local\qg9Eg\bdechangepin.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c8b69a633d1e7e71bb9a49c08dcd059b
SHA1db4dbb2144e136041ccbb4bdba0e95dd24593ebe
SHA25684fb038115758cf95ecd75cc8c8d49396d732bb6b8a57947fe06c0ebd0bc714f
SHA512783b76061351c119d59ce2d3bb4cba399388a63a0578b9f9976de865984d87b95524b94b113f804171de722f0127534503e05ee3514906523d4b9d8bbc83fd3c
-
Filesize
84KB
MD540f4014416ff0cbf92a9509f67a69754
SHA11798ff7324724a32c810e2075b11c09b41e4fede
SHA256f31b4c751dbca276446119ba775787c3eb032da72eabcd40ad96a55826a3f33c
SHA512646dfe4cfe90d068c3da4c35f7053bb0f57687875a0f3469c0683e707306e6a42b0baca3e944d78f9be5c564bb0600202c32c223a770f89d3e2b07a24673c259
-
Filesize
1.4MB
MD5fc0c9263528ff75c533bfdf72a939d69
SHA1f8d73e90af54c62c6dd3e5d0f86c72248e9971b4
SHA2560a8f9d86062a58308cdf2bfe787a773cd819d330de67703f5a03973c01edb332
SHA512d9c14f42ec3217ef9bc04c86cf6917b7faa4cb427facfec9f3efc1365d2586dbc988475078512b9aa487f8e419780ea3a9237e53adbe240e250e6f46f3cd0b60
-
Filesize
373KB
MD5601a28eb2d845d729ddd7330cbae6fd6
SHA15cf9f6f9135c903d42a7756c638333db8621e642
SHA2564d43f37576a0ebbaf97024cd5597d968ffe59c871b483554aea302dccb7253f6
SHA5121687044612ceb705f79c806b176f885fd01449251b0097c2df70280b7d10a2b830ee30ac0f645a7e8d8067892f6562d933624de694295e22318863260222859d
-
Filesize
128KB
MD5d45618e58303edb4268a6cca5ec99ecc
SHA11f8049fc5ea8b57bb68e19fb55cb9dc1e18e9513
SHA256d527323643be9df4d174c3169c6f2c7854a59b781654bcaebd154cb51fb4219c
SHA5125d7ae663dcfedfaf00836dc018131851e5a40778bd582b417b9f0bbd4bb6d1b2eb8f37f7f5a01cd2beed78b6037ef6eb2a3290248d5e901173b1407990a202bd
-
Filesize
1.2MB
MD587a2adc3456c7010aafe78952e3e88d7
SHA1d85a676cb42a62d5feef29e944c7e5ea8865c146
SHA256b486312265046dd4f3adbd5838031afde8b8e03f7910b7994ba506b9ccc0043f
SHA512ffda1b58e01fac67dca82cc73ace00d127cac270d86d2f6ce1634867fadd174f7a8067fcf799c353ccfeee01daabd2a017d756a96c4caa83dca7e54e501d0343
-
Filesize
1KB
MD5f3d0075ec704bcb2f0e315f7fa74bc04
SHA16f4038fa2f028c52fc36b919185893b6d2a2135d
SHA2562de7c955af4e9bbd293f1d7291ff60c02d3346df12bfea467eb5966c19c45b52
SHA512c47f0a1d121464d3adb34c8e7e7670207da51f1f51f4186d6646e8cd64bc354e06f8c00e6d3da68da0ebf01f0333fd10d81b218ee9252991b0aff4238c5ca79e