Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
b79de8bd575fd4c340b9fa4352696533_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
b79de8bd575fd4c340b9fa4352696533_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b79de8bd575fd4c340b9fa4352696533
-
SHA1
7e1b2fab1003993cb117cae87b239b42e657a56d
-
SHA256
5f809c22a4793c5f79ce37d5621580998d890837537e420d638ef1681964220d
-
SHA512
1d573f55c41b7315076e602eccc5a5830fc284e63df96863350c19cb21f363703759ab404a324298ee9c4731b9399041814c5d53e194f15bc21c486118cf5d0a
-
SSDEEP
24576:vuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:R9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3524-4-0x0000000002920000-0x0000000002921000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
pid Process 4120 rdpshell.exe 4944 mmc.exe 1880 SystemPropertiesRemote.exe 3300 SppExtComObj.Exe -
Loads dropped DLL 4 IoCs
pid Process 4120 rdpshell.exe 4944 mmc.exe 1880 SystemPropertiesRemote.exe 3300 SppExtComObj.Exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qgfqnr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\wwEu\\SYSTEM~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SppExtComObj.Exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1884 rundll32.exe 1884 rundll32.exe 1884 rundll32.exe 1884 rundll32.exe 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found 3524 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found Token: SeShutdownPrivilege 3524 Process not Found Token: SeCreatePagefilePrivilege 3524 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3524 Process not Found -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4496 3524 Process not Found 94 PID 3524 wrote to memory of 4496 3524 Process not Found 94 PID 3524 wrote to memory of 4120 3524 Process not Found 95 PID 3524 wrote to memory of 4120 3524 Process not Found 95 PID 3524 wrote to memory of 1688 3524 Process not Found 96 PID 3524 wrote to memory of 1688 3524 Process not Found 96 PID 3524 wrote to memory of 4944 3524 Process not Found 97 PID 3524 wrote to memory of 4944 3524 Process not Found 97 PID 3524 wrote to memory of 1856 3524 Process not Found 98 PID 3524 wrote to memory of 1856 3524 Process not Found 98 PID 3524 wrote to memory of 1880 3524 Process not Found 99 PID 3524 wrote to memory of 1880 3524 Process not Found 99 PID 3524 wrote to memory of 772 3524 Process not Found 100 PID 3524 wrote to memory of 772 3524 Process not Found 100 PID 3524 wrote to memory of 3300 3524 Process not Found 101 PID 3524 wrote to memory of 3300 3524 Process not Found 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b79de8bd575fd4c340b9fa4352696533_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:4496
-
C:\Users\Admin\AppData\Local\CUyNSRND\rdpshell.exeC:\Users\Admin\AppData\Local\CUyNSRND\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4120
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵PID:1688
-
C:\Users\Admin\AppData\Local\tY2WGyM2s\mmc.exeC:\Users\Admin\AppData\Local\tY2WGyM2s\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4944
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵PID:1856
-
C:\Users\Admin\AppData\Local\2s6\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\2s6\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1880
-
C:\Windows\system32\SppExtComObj.ExeC:\Windows\system32\SppExtComObj.Exe1⤵PID:772
-
C:\Users\Admin\AppData\Local\YoTWRgkj\SppExtComObj.ExeC:\Users\Admin\AppData\Local\YoTWRgkj\SppExtComObj.Exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD565183ca7e7dc1d2a3de180faa80f5403
SHA1515414389eddc2d03741ae72615e0652e1849939
SHA25683dba18f640fe71b92d8e0fd74b5477b9500cd66beb4bc7c661aa88afe36ed74
SHA512b0c233ad5d5535bf7954cca01e05a1b85a50798d25690059b272c2d74deb27ff1085755e41edc7b47394757591c0cc90742df28458d1379cfa32b79af53d9c67
-
Filesize
82KB
MD5cdce1ee7f316f249a3c20cc7a0197da9
SHA1dadb23af07827758005ec0235ac1573ffcea0da6
SHA2567984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932
SHA512f1dc529ebfed814adcf3e68041243ee02ba33b56c356a63eba5ef2cb6ede1eda192e03349f6a200d34dfab67263df79cf295be3706f4197b9008ccdc53410c26
-
Filesize
1.2MB
MD5d26c67d5ee37f89a5ff1d428f109633a
SHA11574ed33d384ddc8664bcf9e05bb5a4e16f8cd29
SHA2565226fbbc5d4bdb028bf8061d411f83d381d98c154b5a41871d88582b50e3df4a
SHA512d59eb5501433d12235dacc12d6095048ccdf95b45ec52a5e7862b420019454fda7a12aeed240fb28d75227baf2e41352fb1a328227fbb0366b0d25659abd7739
-
Filesize
468KB
MD5428066713f225bb8431340fa670671d4
SHA147f6878ff33317c3fc09c494df729a463bda174c
SHA256da6c395a2018d3439ad580a19e6a1ca5ff29ef9074411ee9f9f1b0a6365dfebd
SHA512292aad2762ae4dc519c69411aa114a29894f60ffac103813db4946f2fac4f5a166f66523c421529d6847c0882d8ab467392ee8da1e3a4fca0d6d4e6ebda5b737
-
Filesize
1.2MB
MD5e372f9f681bdc2a361dd62ef7caed8fd
SHA1c26405a17b81a0c75f3dc0a604625da4ecb1d9f2
SHA25656ee9db744abff04d8d4064a724e159b566332f0e99b1719021a80368e11135a
SHA512163e14b0c28c5046890e5e303c6bfe581fa6f8de83961ddb7e0f1be1efccc153086d94c52cbde4b4ae47103cc6b533e401d47fa1f1a14a33090bdab5ea421896
-
Filesize
559KB
MD5728a78909aa69ca0e976e94482350700
SHA16508dfcbf37df25cae8ae68cf1fcd4b78084abb7
SHA2562a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c
SHA51222bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1
-
Filesize
1.2MB
MD544f89e03da9ab3c8285fb1e519f7e7e4
SHA158857b0ad5ec74e53012bba3be266eecbc6c817b
SHA256fd0ef4519a7782f29e4ce064302fd2868dc4b094ff71acf7f9f75ca9cb0e0f7f
SHA512b8ba19535dd7e287d8bd2e579d6533aa61bfdb9da0336ec0b1dfed450bbe60b5d28f24fd01129c7eca99af6bdf77395f1dc3755d528387718b34582d7d6befd6
-
Filesize
1.8MB
MD58c86b80518406f14a4952d67185032d6
SHA19269f1fbcf65fefbc88a2e239519c21efe0f6ba5
SHA256895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a
SHA5121bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099
-
Filesize
1KB
MD5c634d5365af1ba3853355c371b1f37d4
SHA158817b920b651f87432d1b3b297663f3f3722c7b
SHA256c3fcfe40191a5c624cad274fb478439e42fb059dd6938fb6f8a072a27e0cfee0
SHA51260d52215fa95eff218b2e257aaca622fa5eb6324b5a93c8a53f76dcc6e6e97808435ed79983ba130edaac4d4a96c003dab9c7361aa08d3fab82a711f3ff21c76