Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
c3f2ded942c2442b77fd47ce652bb792_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c3f2ded942c2442b77fd47ce652bb792_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c3f2ded942c2442b77fd47ce652bb792_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c3f2ded942c2442b77fd47ce652bb792
-
SHA1
b411d07b595927f4ff541b513faca778a85d38f3
-
SHA256
2483394b81137cb8a95584ee70556b2624b4ec757cea17624f2b17b8c975e3c6
-
SHA512
0926a6344d42a0f09262a7ce2e1b99f7009f8ab01b897dfde65a7e2df7e0ab192fd6f6d7b353303c10114e83d5d3d926cbd5c94e4f3ddf05b1a16231b3819977
-
SSDEEP
24576:iuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:q9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3464-4-0x0000000002D00000-0x0000000002D01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wbengine.exesethc.exeSystemPropertiesRemote.exepid Process 3292 wbengine.exe 536 sethc.exe 4088 SystemPropertiesRemote.exe -
Loads dropped DLL 3 IoCs
Processes:
wbengine.exesethc.exeSystemPropertiesRemote.exepid Process 3292 wbengine.exe 536 sethc.exe 4088 SystemPropertiesRemote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zsovh = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\EXff\\sethc.exe" -
Processes:
rundll32.exewbengine.exesethc.exeSystemPropertiesRemote.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 3 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 4516 rundll32.exe 4516 rundll32.exe 4516 rundll32.exe 4516 rundll32.exe 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3464 3464 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3464 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3464 wrote to memory of 3508 3464 88 PID 3464 wrote to memory of 3508 3464 88 PID 3464 wrote to memory of 3292 3464 89 PID 3464 wrote to memory of 3292 3464 89 PID 3464 wrote to memory of 3596 3464 90 PID 3464 wrote to memory of 3596 3464 90 PID 3464 wrote to memory of 536 3464 91 PID 3464 wrote to memory of 536 3464 91 PID 3464 wrote to memory of 2088 3464 96 PID 3464 wrote to memory of 2088 3464 96 PID 3464 wrote to memory of 4088 3464 97 PID 3464 wrote to memory of 4088 3464 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3f2ded942c2442b77fd47ce652bb792_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵PID:3508
-
C:\Users\Admin\AppData\Local\KmAZN\wbengine.exeC:\Users\Admin\AppData\Local\KmAZN\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3292
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:3596
-
C:\Users\Admin\AppData\Local\M6KH\sethc.exeC:\Users\Admin\AppData\Local\M6KH\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:536
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵PID:2088
-
C:\Users\Admin\AppData\Local\Ody\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\Ody\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD517270a354a66590953c4aac1cf54e507
SHA1715babcc8e46b02ac498f4f06df7937904d9798d
SHA2569954394b43783061f9290706320cc65597c29176d5b8e7a26fa1d6b3536832b4
SHA5126be0ba6be84d01ab47f5a4ca98a6b940c43bd2d1e1a273d41c3e88aca47da11d932024b007716d1a6ffe6cee396b0e3e6971ab2afc293e72472f2e61c17b2a89
-
Filesize
1.2MB
MD50579b9115b48c96d3f64e54098559986
SHA194bf256f1006f893ee434100dcffefef08e1ffc9
SHA2569bd12cb81b959ca6e5f6aeabc7e8b0c05f6879e5a34552b15677046513dffa32
SHA5123c700ae4ecd4822e49230a528ee116d3567c0cd4e5c09dbc9d150168b8490ac34dd2e809ab612dde41dcb131e31e4bef1c519e1d42ac2517797ecd9d3d50b916
-
Filesize
1.4MB
MD5cd95c3cdf742b3851bff75a553d8b419
SHA154e56f6c91aa1b65034d3657806daf1427b854ff
SHA25689dbb10c048c1fe7e15eeb6dae70a00ff72b396b9a00c810d3488af0515401a7
SHA512599fec5b624e4046e082b0eb98de2515706172351d8f4ee116ae581a645a602094500d6a697402d0611a89d38198d3d5b9fc896989af4f78ced8c74f5fce09f4
-
Filesize
104KB
MD58ba3a9702a3f1799431cad6a290223a6
SHA19c7dc9b6830297c8f759d1f46c8b36664e26c031
SHA256615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8
SHA512680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746
-
Filesize
1.2MB
MD505998e89164c945befe57a09d29fdfb7
SHA1f94093d18ae734b5bedf7fdcb8d36fae7099ccf4
SHA25613a6b0b39e8ade37122d9fd6e36ccf8722d9487d71d850ac0260fd65dde27f68
SHA51218d2b65109d30cb875b25117d1e6ded7391c10d24ace6dc35ee59553fdc87715aa1c6138429709cd44ee954c27c213b17e20124762f6bcd26c0210cfd9bef39b
-
Filesize
82KB
MD5cdce1ee7f316f249a3c20cc7a0197da9
SHA1dadb23af07827758005ec0235ac1573ffcea0da6
SHA2567984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932
SHA512f1dc529ebfed814adcf3e68041243ee02ba33b56c356a63eba5ef2cb6ede1eda192e03349f6a200d34dfab67263df79cf295be3706f4197b9008ccdc53410c26
-
Filesize
1KB
MD5f29dcdc2999719107aa31b95963a8470
SHA1bf2ad0bd1ba9ae029bae76a2a33cedf40315c8da
SHA2565d705acea7caa3fb51a37537c87b7ca918a7a7ba84c94d19c30f6c7397074732
SHA5125393d65a398da9ebd2b31fb153bb18ea7c786b9f276bed7ae8500b137ebb1695fb73b0231a145c24720a5c3b158f491f631e45e247d1134903efba658e9af67a