Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
b67e1a99078ceeb5362a14bce73556dd_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
b67e1a99078ceeb5362a14bce73556dd_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b67e1a99078ceeb5362a14bce73556dd
-
SHA1
ee4555a24557d837ffd2dc0fa43179df48458700
-
SHA256
e302306cb2efdb2aa9c986801e8e5b7f74a8ef7216020e69cb4048515109d09c
-
SHA512
a7bb236f33933955dd4f274f9828bd1026b8a8ca94ebc40efec8ffcf2e3c3223c48416c212602c8aade8ec8eeedacce1cac8425908799cc7d3b539c2bdcda6ce
-
SSDEEP
24576:uuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:O9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3440-4-0x00000000014C0000-0x00000000014C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DmNotificationBroker.exeLicensingUI.exeRdpSa.exepid Process 4104 DmNotificationBroker.exe 1004 LicensingUI.exe 1816 RdpSa.exe -
Loads dropped DLL 3 IoCs
Processes:
DmNotificationBroker.exeLicensingUI.exeRdpSa.exepid Process 4104 DmNotificationBroker.exe 1004 LicensingUI.exe 1816 RdpSa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qebzqfuc = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\xA0EEAsZlF\\LicensingUI.exe" -
Processes:
RdpSa.exerundll32.exeDmNotificationBroker.exeLicensingUI.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DmNotificationBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LicensingUI.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1588 rundll32.exe 1588 rundll32.exe 1588 rundll32.exe 1588 rundll32.exe 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3440 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3440 wrote to memory of 2744 3440 96 PID 3440 wrote to memory of 2744 3440 96 PID 3440 wrote to memory of 4104 3440 97 PID 3440 wrote to memory of 4104 3440 97 PID 3440 wrote to memory of 1240 3440 98 PID 3440 wrote to memory of 1240 3440 98 PID 3440 wrote to memory of 1004 3440 99 PID 3440 wrote to memory of 1004 3440 99 PID 3440 wrote to memory of 3348 3440 100 PID 3440 wrote to memory of 3348 3440 100 PID 3440 wrote to memory of 1816 3440 101 PID 3440 wrote to memory of 1816 3440 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b67e1a99078ceeb5362a14bce73556dd_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
C:\Windows\system32\DmNotificationBroker.exeC:\Windows\system32\DmNotificationBroker.exe1⤵PID:2744
-
C:\Users\Admin\AppData\Local\jebr9MQt\DmNotificationBroker.exeC:\Users\Admin\AppData\Local\jebr9MQt\DmNotificationBroker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4104
-
C:\Windows\system32\LicensingUI.exeC:\Windows\system32\LicensingUI.exe1⤵PID:1240
-
C:\Users\Admin\AppData\Local\SjIfB\LicensingUI.exeC:\Users\Admin\AppData\Local\SjIfB\LicensingUI.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1004
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe1⤵PID:3348
-
C:\Users\Admin\AppData\Local\TaPxCM85\RdpSa.exeC:\Users\Admin\AppData\Local\TaPxCM85\RdpSa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b2659f18c603a26d374505edda901c85
SHA183e5775a02388a2614e4f4821bc63845912b9cb9
SHA256c9b91aaec13d0b6be86566066eca2a5cdaa2014f3e5848c80ad57f00aa7cfc4c
SHA512b8538d0f907e69d38a1217360e1f61c95afafd090615ceefd6861c8b33858fc270b294e4d3984f19a79edbb2f0adc3c33da00e838dc01716d166fe10de877462
-
Filesize
142KB
MD58b4abc637473c79a003d30bb9c7a05e5
SHA1d1cab953c16d4fdec2b53262f56ac14a914558ca
SHA2560e9eb89aa0df9bb84a8f11b0bb3e9d89905355de34c91508968b4cb78bc3f6c5
SHA5125a40c846c5b3a53ae09114709239d8238c322a7d3758b20ed3fc8e097fc1409f62b4990557c1192e894eabfa89741a9d88bd5175850d039b97dfdf380d1c6eeb
-
Filesize
56KB
MD55992f5b5d0b296b83877da15b54dd1b4
SHA10d87be8d4b7aeada4b55d1d05c0539df892f8f82
SHA25632f60eabe54c4d0cd0f0ec29f48f55ca1ad097bf35097247b186fd70426f847c
SHA5124f6da913af530301da1d0638aa2635ada446ebee6e27b5059db5c2b7fe439162ac3b1a595ecf4163a093890df9ac94d9085a53d8c991e48703f9d2691326e7e6
-
Filesize
1.2MB
MD55b37e0c24330c5f5e5148c2e3c69737d
SHA16d9ebc6c955ba81f276e5ab6f8fa9230516aec62
SHA2567e6ad4a680cf174fc8ff21b33b95bb6b885282ef13ac6e0edba7816cfe4deea6
SHA51264ebe27a7fdf0a25c95349270089aa3f610f3e937458b399e2e59aa8c3a7d0ba787168c8bef3b718b5633d2589c436958c289f7284c66c17a0ab0be801643b04
-
Filesize
1.4MB
MD5fd75e9723f20f653063893af15337fb7
SHA1a73da4ae574fe1f0ca7d98a37479ce8788e66988
SHA256f397d90cc924a560cb713dd1e1d56099bc80d7eb1d081d754ae416369ee3b1f0
SHA51200f9c1845610dd8af5a6ae55051e7984d9207430bd69b98455d547b50c23bc5cf49b95e5e50151407df10bb49c1802b0c5741866cbc0d74769c32d9d618e2b47
-
Filesize
32KB
MD5f0bdc20540d314a2aad951c7e2c88420
SHA14ab344595a4a81ab5f31ed96d72f217b4cee790b
SHA256f87537e5f26193a2273380f86cc9ac16d977f65b0eff2435e40be830fd99f7b5
SHA512cb69e35b2954406735264a4ae8fe1eca1bd4575f553ab2178c70749ab997bda3c06496d2fce97872c51215a19093e51eea7cc8971af62ad9d5726f3a0d2730aa
-
Filesize
1KB
MD5b812ced96db7bdede20a1732575a6079
SHA1a8fb45e14ddf8012892b27ee9be3241985e73dbd
SHA25665b051a39cb4e2ee5663cd01b30938700123c4a779885f3db0700969af0271a1
SHA51204c0af1d801473f119c87d7a0e7f6d92fb1ccef423241b830ccc546bf98f94a696376ad632ec0e68b3cdeac29bbcefcfd24d00b0842edfaaf60a5ad8d9837df2