Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 16:04
Static task
static1
Behavioral task
behavioral1
Sample
bc6a7f50f96beb004bcf9c6174e93bbd_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
bc6a7f50f96beb004bcf9c6174e93bbd_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
bc6a7f50f96beb004bcf9c6174e93bbd
-
SHA1
938e569330ff878fcbd597dc60106be24764991b
-
SHA256
5ed7ff55cc5fd11a4ac5a823ff7cebb7e252e0a8d37dc1a1715d4098af9aeedc
-
SHA512
b8c02c3651cb233c51420bf357c41fd243582b75fa8223d92fbeeebeb3117bdbd507a93e9349f94c33502dd5f531a4281c6cbceff3bf5fcdc15894fbe23ca8b1
-
SSDEEP
24576:ouYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:Y9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3484-4-0x0000000002D60000-0x0000000002D61000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
FXSCOVER.exeCameraSettingsUIHost.exewextract.exepid Process 4044 FXSCOVER.exe 976 CameraSettingsUIHost.exe 4556 wextract.exe -
Loads dropped DLL 3 IoCs
Processes:
FXSCOVER.exeCameraSettingsUIHost.exewextract.exepid Process 4044 FXSCOVER.exe 976 CameraSettingsUIHost.exe 4556 wextract.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zsovh = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\CachedFiles\\kCihaTnh\\CameraSettingsUIHost.exe" -
Processes:
CameraSettingsUIHost.exewextract.exerundll32.exeFXSCOVER.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CameraSettingsUIHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1376 rundll32.exe 1376 rundll32.exe 1376 rundll32.exe 1376 rundll32.exe 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3484 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3484 wrote to memory of 1176 3484 95 PID 3484 wrote to memory of 1176 3484 95 PID 3484 wrote to memory of 4044 3484 96 PID 3484 wrote to memory of 4044 3484 96 PID 3484 wrote to memory of 4328 3484 97 PID 3484 wrote to memory of 4328 3484 97 PID 3484 wrote to memory of 976 3484 98 PID 3484 wrote to memory of 976 3484 98 PID 3484 wrote to memory of 4204 3484 99 PID 3484 wrote to memory of 4204 3484 99 PID 3484 wrote to memory of 4556 3484 100 PID 3484 wrote to memory of 4556 3484 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc6a7f50f96beb004bcf9c6174e93bbd_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:1176
-
C:\Users\Admin\AppData\Local\1eZZG3D\FXSCOVER.exeC:\Users\Admin\AppData\Local\1eZZG3D\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4044
-
C:\Windows\system32\CameraSettingsUIHost.exeC:\Windows\system32\CameraSettingsUIHost.exe1⤵PID:4328
-
C:\Users\Admin\AppData\Local\yu0PwcRNk\CameraSettingsUIHost.exeC:\Users\Admin\AppData\Local\yu0PwcRNk\CameraSettingsUIHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:976
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵PID:4204
-
C:\Users\Admin\AppData\Local\fwFrd6LfE\wextract.exeC:\Users\Admin\AppData\Local\fwFrd6LfE\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD55769f78d00f22f76a4193dc720d0b2bd
SHA1d62b6cab057e88737cba43fe9b0c6d11a28b53e8
SHA25640e8e6dabfa1485b11cdccf220eb86eeaa8256e99e344cf2b2098d4cdb788a31
SHA512b4b3448a2635b21690c71254d964832e89bf947f7a0d32e79dcc84730f11d4afb4149a810a768878e52f88fc8baec45f1a2fec8e22c5301e9f39fe4fc6a57e3f
-
Filesize
1.2MB
MD5febf113fb88c26da98ec27caea7f2e40
SHA1763178bf0f1ca6a89a48e92f9e03fa610009ce40
SHA256a10c4b726d899c2e695704318de8a3896e5e4b968c75e991ff07ef60eacfb6d7
SHA5124a5e8df94d62372a1a6aedc6e9e39cba335db2053c0f723f8272d7d5bfbee741af2ba389eb4cb75ac3bdeed59e15f30d1178057a400a5a06bda0eb5c76ba4a49
-
Filesize
1.2MB
MD54f7ff358f7ca36ae0fa19fd313f9a09b
SHA187fb7eb16377a777064dc6e425409bfc37eac046
SHA256f4e21aee2258204404f2c6ffc3f8823a999df85c1038d71bac1d022710aad827
SHA51250f28d43e51b1dc8fc1b04d602310b37a362cb14697eaa8b263805dedbb64cdf8aa22f9515aff50ff029f44910d71b72e783f8566faa9e131abdf7482df81bca
-
Filesize
143KB
MD556e501e3e49cfde55eb1caabe6913e45
SHA1ab2399cbf17dbee7b302bea49e40d4cee7caea76
SHA256fbb6dc62abeeb222b49a63f43dc6eea96f3d7e9a8da55381c15d57a5d099f3e0
SHA5122b536e86cbd8ab026529ba2c72c0fda97e9b6f0bc4fd96777024155852670cb41d17937cde372a44cdbad3e53b8cd3ef1a4a3ee9b34dfb3c2069822095f7a172
-
Filesize
31KB
MD59e98636523a653c7a648f37be229cf69
SHA1bd4da030e7cf4d55b7c644dfacd26b152e6a14c4
SHA2563bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717
SHA51241966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78
-
Filesize
1.4MB
MD5cece3428f0d087437a20fc45649f62e5
SHA1a35b3a55c51a1dae6054f22f9dacc00318580aaa
SHA25601831eadaa157e44d3a84f6f50826980066530c5ee5c8853544af7a59c80200f
SHA512e249c4d545601d00ab7907cd73e9fe154b296e51aea41e03e7e2b0c47d744b90cf9db12ee6601faf075350478e7f11fdd9e4574c6110c66f1127641c7768c69b
-
Filesize
1KB
MD56c1022f4ad92046682012a748ddd7cc0
SHA1214e28ba73553280ae147ea176ccdc77774e77ef
SHA2566ac6a07baec2b35c3a3e4a6f596c1199925702acc77905c765669faef981c9f6
SHA512e89c98d07dcc5600adbdc80f56bf4a82004638dbeb0c1c7a429d37932e116ab3b6dd65edcd0e30b8af33b97614ce0d8fcf0c91a66ddeebceecaf4a1e6f29f7a5