Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
b612fd6158326f6573d2c195218b4187_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
b612fd6158326f6573d2c195218b4187_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b612fd6158326f6573d2c195218b4187
-
SHA1
8a784d8434dc4ee8a185038e55beeae77169be6e
-
SHA256
0a5a9a825cdb713862e4db1eeea33b8847e231cc54197c9b4b7b958c70e9c253
-
SHA512
41fa451ca8ff1d805fa5407174fa0e59a6468017a91a3f2b2a0db6b84cbd26573bbce4788ead48c3fc41e40313886c2ef2237a6e99a9f41b710cf344ba1cb47a
-
SSDEEP
24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:F9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3420-4-0x0000000007F20000-0x0000000007F21000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
ApplySettingsTemplateCatalog.exeWFS.exeLockScreenContentServer.exepid Process 2832 ApplySettingsTemplateCatalog.exe 1600 WFS.exe 1196 LockScreenContentServer.exe -
Loads dropped DLL 3 IoCs
Processes:
ApplySettingsTemplateCatalog.exeWFS.exeLockScreenContentServer.exepid Process 2832 ApplySettingsTemplateCatalog.exe 1600 WFS.exe 1196 LockScreenContentServer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Veuhujsfce = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\sBiXz4FnO3Y\\WFS.exe" -
Processes:
rundll32.exeApplySettingsTemplateCatalog.exeWFS.exeLockScreenContentServer.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplySettingsTemplateCatalog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LockScreenContentServer.exe -
Modifies registry class 1 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3420 3420 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3420 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3420 wrote to memory of 5104 3420 95 PID 3420 wrote to memory of 5104 3420 95 PID 3420 wrote to memory of 2832 3420 96 PID 3420 wrote to memory of 2832 3420 96 PID 3420 wrote to memory of 4480 3420 97 PID 3420 wrote to memory of 4480 3420 97 PID 3420 wrote to memory of 1600 3420 98 PID 3420 wrote to memory of 1600 3420 98 PID 3420 wrote to memory of 232 3420 99 PID 3420 wrote to memory of 232 3420 99 PID 3420 wrote to memory of 1196 3420 100 PID 3420 wrote to memory of 1196 3420 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b612fd6158326f6573d2c195218b4187_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
C:\Windows\system32\ApplySettingsTemplateCatalog.exeC:\Windows\system32\ApplySettingsTemplateCatalog.exe1⤵PID:5104
-
C:\Users\Admin\AppData\Local\KYVuYR\ApplySettingsTemplateCatalog.exeC:\Users\Admin\AppData\Local\KYVuYR\ApplySettingsTemplateCatalog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2832
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵PID:4480
-
C:\Users\Admin\AppData\Local\MXO\WFS.exeC:\Users\Admin\AppData\Local\MXO\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1600
-
C:\Windows\system32\LockScreenContentServer.exeC:\Windows\system32\LockScreenContentServer.exe1⤵PID:232
-
C:\Users\Admin\AppData\Local\9Dm\LockScreenContentServer.exeC:\Users\Admin\AppData\Local\9Dm\LockScreenContentServer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD569b1b3f93111cd3d442f8cfd70f11fdd
SHA18f1fc3b174507fd3b7d17d953003744e3f59406e
SHA2566feb0ad8be27dafc2976361b1155a5a31ad234871de4901e0180b237b779084f
SHA51281f8a75507717459f6950a95124f30ae0834ff47ae1640c7264a64a104f51b0f4a7d1e3c489f133475fdc8df2b38557df4fa6acd2fae33221b770a85efd11eda
-
Filesize
47KB
MD5a0b7513c98cf46ca2cea3a567fec137c
SHA12307fc8e3fc620ea3c2fdc6248ad4658479ba995
SHA256cb2278884f04fd34753f7a20e5865ef5fc4fa47c28df9ac14ad6e922713af8c6
SHA5123928485a60ffa7f2d2b7d0be51863e1f8197578cfb397f1086a1ab5132843a23bbc4042b04b5d01fafad04878bd839161fa492d0cf1a6bac6be92023cdee3d15
-
Filesize
1.2MB
MD5c99312cd870da4a46aebe448d0d5f64a
SHA1a4b54ec8ebdefc22b330e5e0233457bbf89e7263
SHA2566c2673fd1b97347f83dfbb9c27f7c1ab760d94e0e32dfd1bd430b00a2430a126
SHA5124a5ecfbce45e4e2d073e9fb57b2aacf75b9f47b546979056e4c25d7962e8ea1f58f6c570e75464be7e2a607812b0687a1f769b6b75db46b9c89cd569efcf650f
-
Filesize
1.1MB
MD513af41b1c1c53c7360cd582a82ec2093
SHA17425f893d1245e351483ab4a20a5f59d114df4e1
SHA256a462f29efaaa3c30411e76f32608a2ba5b7d21af3b9804e5dda99e342ba8c429
SHA512c7c82acef623d964c520f1a458dbfe34099981de0b781fb56e14b1f82632e3a8437db6434e7c20988aa3b39efde47aab8d188e80845e841a13e74b079285706a
-
Filesize
944KB
MD53cbc8d0f65e3db6c76c119ed7c2ffd85
SHA1e74f794d86196e3bbb852522479946cceeed7e01
SHA256e23e4182efe7ed61aaf369696e1ce304c3818df33d1663872b6d3c75499d81f4
SHA51226ae5845a804b9eb752078f1ffa80a476648a8a9508b4f7ba56c94acd4198f3ba59c77add4feb7e0420070222af56521ca5f6334f466d5db272c816930513f0a
-
Filesize
1.2MB
MD50a30e11a2d1e1594944f0b9423ced769
SHA199c34c3402861a27d79bbc902415d02f432eac45
SHA256eb3c17e2e29b48052403adfa3ae6198a0894f2a38ee19246b308478014569f73
SHA51228f6abed6280c4f039c653b7db497e5f4ae779ce97c1f580822015112417dc9f9c978471343fdab4ac95c5a7dcaafdbdfcf1c71504288cd458e1dcbe270ae9ef
-
Filesize
1KB
MD5c1f3f533ca454d706db68f3e6244b78d
SHA11f1acb819433fe66f58807b49ba310457ef51e16
SHA2566315bdae254ca4bee5a8c110787ba41d9d387c6664962cd80705abd0a5aff056
SHA512a3aed715cfa736c2a3c4a3d858334bc11753b41a43ce8825a5791912bd1e1e6c6f4c63995506fb86dd78fdb0af22458cd2131027f5807c46c2e68a1d89525b75