Analysis
-
max time kernel
150s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
b9b6b51144875ab0e2b29256a5de1483_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
b9b6b51144875ab0e2b29256a5de1483_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b9b6b51144875ab0e2b29256a5de1483
-
SHA1
fa894de7d15f6ea99a125c52fae5a468f51d27a4
-
SHA256
57aebefa5e25857379598239bf44620b3cc86347e87215c1f2e08581f5af4d89
-
SHA512
45696f27dbcf76f3656622b43e7c2dc1df5c69f9a4c28122d1a0cab4945a5842f8daac1855d0e143d631a096bec5fe630dc7211b225ede8657a5c61d4a471f63
-
SSDEEP
24576:KuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NhOO:S9cKrUqZWLAcU8O
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3536-4-0x0000000007DC0000-0x0000000007DC1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1624 MDMAppInstaller.exe 1540 mfpmp.exe 1112 dpapimig.exe -
Loads dropped DLL 3 IoCs
pid Process 1624 MDMAppInstaller.exe 1540 mfpmp.exe 1112 dpapimig.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ygssokoticw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Templates\\LiveContent\\16\\User\\LKVPIoXaG\\mfpmp.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MDMAppInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4144 regsvr32.exe 4144 regsvr32.exe 4144 regsvr32.exe 4144 regsvr32.exe 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found 3536 Process not Found -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found Token: SeShutdownPrivilege 3536 Process not Found Token: SeCreatePagefilePrivilege 3536 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3536 Process not Found 3536 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3536 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3536 wrote to memory of 1264 3536 Process not Found 95 PID 3536 wrote to memory of 1264 3536 Process not Found 95 PID 3536 wrote to memory of 1624 3536 Process not Found 96 PID 3536 wrote to memory of 1624 3536 Process not Found 96 PID 3536 wrote to memory of 4428 3536 Process not Found 97 PID 3536 wrote to memory of 4428 3536 Process not Found 97 PID 3536 wrote to memory of 1540 3536 Process not Found 98 PID 3536 wrote to memory of 1540 3536 Process not Found 98 PID 3536 wrote to memory of 224 3536 Process not Found 99 PID 3536 wrote to memory of 224 3536 Process not Found 99 PID 3536 wrote to memory of 1112 3536 Process not Found 100 PID 3536 wrote to memory of 1112 3536 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b9b6b51144875ab0e2b29256a5de1483_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
C:\Windows\system32\MDMAppInstaller.exeC:\Windows\system32\MDMAppInstaller.exe1⤵PID:1264
-
C:\Users\Admin\AppData\Local\wB87TEeLY\MDMAppInstaller.exeC:\Users\Admin\AppData\Local\wB87TEeLY\MDMAppInstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1624
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:4428
-
C:\Users\Admin\AppData\Local\amF8WYdI\mfpmp.exeC:\Users\Admin\AppData\Local\amF8WYdI\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1540
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:224
-
C:\Users\Admin\AppData\Local\ITbNV\dpapimig.exeC:\Users\Admin\AppData\Local\ITbNV\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5986ee3b344ba7c2fb044ac424616c991
SHA101ee7935a9ac627468ca085f8d616eca2608236d
SHA25651dddafe72e663b0ffcddef03a407299009bf8433ae54b395dffd039e6bbeb89
SHA512799aa0877b07c85012e9abd683e35aefcb9a0b86f6ed3c05543b9dbceeb3ae296de11bb885cbefaeee7ff97c46c86770e012a35c76ec7594819775392171cb4c
-
Filesize
76KB
MD5b6d6477a0c90a81624c6a8548026b4d0
SHA1e6eac6941d27f76bbd306c2938c0a962dbf1ced1
SHA256a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb
SHA51272ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe
-
Filesize
1.2MB
MD534fefbd71f0bfa640fcdda2c90d869ee
SHA1d2ee379b1f2cb65d597661ba47ff27d9e4e16882
SHA2565eaf625927404fb8b7edb31286cc97dcac4191eb7cb0e763ee342d5c2978603b
SHA512569ce6867003a35b8ee72a5c149d28f5cdc106bd2a0bf9824cea72b4861cd5858675b396d7ac7944a5a15626923027bc3a6dd7a5142d539befc4833afe1206ad
-
Filesize
46KB
MD58f8fd1988973bac0c5244431473b96a5
SHA1ce81ea37260d7cafe27612606cf044921ad1304c
SHA25627287ac874cef86be03aee7b6d34fdc3bd208070ed20e44621a305865fb7579e
SHA512a91179e1561168b3b58f5ca893bce425d35f4a02aec20ac3d6fb944f5eb3c06b0a1b9d9f3fb9ea87869d65671d2b89b4ae19acf794372bdbd27f5e9756c5a8ab
-
Filesize
151KB
MD530e978cc6830b04f1e7ed285cccaa746
SHA1e915147c17e113c676c635e2102bbff90fb7aa52
SHA256dc821931f63117962e2266acd3266e86bf8116d4a14b3adbebfade1d40b84766
SHA512331923fa479f71c4c80b0e86ea238628666f95b6cf61cf4d741ae4a27ea2b8c636864dfac543d14599b4873f3b2ab397d07c4e4c17aca3f3b4e5871e24e50214
-
Filesize
1.2MB
MD5d829dca48e0e58ab59d2cccf68e3d204
SHA1016ceb12203be6b648638f423fdb44caa334e234
SHA256db668da82936c5e67d804cedda6d167694a87941df8e56c24d33bbf1537d2ef4
SHA512a18ade583a374b3f0258d6e57691a9153af755aea4df41c49f7d96ca9dba4eeab4abcd741cbe58271c68f50ba394fea39a46a19f7086eefba623d4db2c89ced5
-
Filesize
1KB
MD50b1e7bc6c7f8fc49eb41c36978090688
SHA1eb10847e5186cee362363c5d331aa8b3dbac9d30
SHA256d0cf932865a27c595efff2c56226c469eae8dfb25dd7eb6c54cccb6b3b3547aa
SHA512a70c42013ce16df8515c9820d8de88d55f1c59c09da64aea3760217aa4a94508279e7e1ce86fd343b3ab1f273b25c79754c25489e8d27557896ef9da11c4ba3b