Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
c11d18fc3052e4bd6c7e1930289ff881_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
c11d18fc3052e4bd6c7e1930289ff881_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c11d18fc3052e4bd6c7e1930289ff881
-
SHA1
a1efb5769620a2d2a01b9e8879e2c7ad6d3e6098
-
SHA256
0acbdd88ad3bfa71a43bfc53fd70200c636ed15847b4587c26b73dd17d2834f0
-
SHA512
2b9a906d482462d17051173427fb71a75e607f2353918983d903fb7c4086a9967fea47cc3e69a539cb4a7ed5288bb4d000c6f1351481e4bf6ac95e97cbbbe5d1
-
SSDEEP
24576:5uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:r9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3592-4-0x0000000008430000-0x0000000008431000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SndVol.exeEhStorAuthn.exeDevicePairingWizard.exepid Process 4412 SndVol.exe 1856 EhStorAuthn.exe 1948 DevicePairingWizard.exe -
Loads dropped DLL 3 IoCs
Processes:
SndVol.exeEhStorAuthn.exeDevicePairingWizard.exepid Process 4412 SndVol.exe 1856 EhStorAuthn.exe 1948 DevicePairingWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wdtbxtklooytt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\GUDKZU~1\\EHSTOR~1.EXE" -
Processes:
rundll32.exeSndVol.exeEhStorAuthn.exeDevicePairingWizard.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe -
Modifies registry class 1 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 4936 rundll32.exe 4936 rundll32.exe 4936 rundll32.exe 4936 rundll32.exe 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 3592 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3592 Token: SeCreatePagefilePrivilege 3592 Token: SeShutdownPrivilege 3592 Token: SeCreatePagefilePrivilege 3592 Token: SeShutdownPrivilege 3592 Token: SeCreatePagefilePrivilege 3592 Token: SeShutdownPrivilege 3592 Token: SeCreatePagefilePrivilege 3592 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3592 3592 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3592 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3592 wrote to memory of 4928 3592 93 PID 3592 wrote to memory of 4928 3592 93 PID 3592 wrote to memory of 4412 3592 94 PID 3592 wrote to memory of 4412 3592 94 PID 3592 wrote to memory of 2064 3592 97 PID 3592 wrote to memory of 2064 3592 97 PID 3592 wrote to memory of 1856 3592 98 PID 3592 wrote to memory of 1856 3592 98 PID 3592 wrote to memory of 4408 3592 99 PID 3592 wrote to memory of 4408 3592 99 PID 3592 wrote to memory of 1948 3592 100 PID 3592 wrote to memory of 1948 3592 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c11d18fc3052e4bd6c7e1930289ff881_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:4928
-
C:\Users\Admin\AppData\Local\4PcJaNjOb\SndVol.exeC:\Users\Admin\AppData\Local\4PcJaNjOb\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4412
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵PID:2064
-
C:\Users\Admin\AppData\Local\YsU\EhStorAuthn.exeC:\Users\Admin\AppData\Local\YsU\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1856
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:4408
-
C:\Users\Admin\AppData\Local\9EkgvEs\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\9EkgvEs\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD5c5d939ac3f9d885c8355884199e36433
SHA1b8f277549c23953e8683746e225e7af1c193ad70
SHA25668b6ced01f5dfc2bc9556b005f4fff235a3d02449ad9f9e4de627c0e1424d605
SHA5128488e7928e53085c00df096af2315490cd4b22ce2ce196b157dc0fbb820c5399a9dbd5dead40b24b99a4a32b6de66b4edc28339d7bacd9c1e7d5936604d1a4f0
-
Filesize
1.2MB
MD5b0b99e9a82213a43c82e5f440bf11af3
SHA10a877d70f14f1378da95819e06b357ab714b3ca2
SHA256889daf95e9122da0ca9d3b715235bb89ef16d61b7b9c3b6b21b917454406b8cb
SHA512d73b1bdad34115675f3ae77995d40c781c5473c91e641673a4e3dd8b06a0cd15cede6e68bd4aedd23ba7d9821867287f1e2889b5b558858734e4fc17082a466e
-
Filesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
Filesize
1.2MB
MD5092ab0ceed40dfd439b99e6fe0ef4c75
SHA1683bb15ec38cf9f28216b4764f261bef6b60fc48
SHA256378a62e770607320db205ebea9f1b0272c8d7322bee43cc44abf8a16b479ccc8
SHA51243ac3bf6bfc66502af1bf6d5f503ff9212c7ddc265a8364618814a9dd6af1968804bcdea95cf6c137f79c524583a08ffba8393d889cca8c35be493ceb7af69d5
-
Filesize
128KB
MD5d45618e58303edb4268a6cca5ec99ecc
SHA11f8049fc5ea8b57bb68e19fb55cb9dc1e18e9513
SHA256d527323643be9df4d174c3169c6f2c7854a59b781654bcaebd154cb51fb4219c
SHA5125d7ae663dcfedfaf00836dc018131851e5a40778bd582b417b9f0bbd4bb6d1b2eb8f37f7f5a01cd2beed78b6037ef6eb2a3290248d5e901173b1407990a202bd
-
Filesize
1.2MB
MD5814080c15054cbe0e2fba29af2d357ec
SHA196874889aa3b076077ae9a355e0a0ad618560713
SHA2569de89ed55eb54260e50340b118ee9d25fe61b80100faec4d46b160f6514afe06
SHA5122c58dd12c31936414f979c0a408600748578e9b503a2e91d79039cc2aa085fb3ec41dc22514dae37d17e3b3d48915bed7bc99b7caeaf26bde8531155404364d8
-
Filesize
1KB
MD5e95e5f88d125afedf2bdde97c17c829e
SHA162cc8d24d689d179e0e6c7d23adccddd3052aec3
SHA256cc88132eb9f857aa20b013432bcc99f7e2d9a5dbb72d7557880ebfd81f9b3fb5
SHA5124d0b1fbaefba2eeb2bedb80424cf89559dd16617fd82de621cb943d22d37d7efb606c5675c4752440b914e17b06b76cd8bd808dc86953fb282f2d66a1fda03b8