Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 18:00
Static task
static1
Behavioral task
behavioral1
Sample
c572ea4c00bbf5b57f75082b7abc9d4a_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
c572ea4c00bbf5b57f75082b7abc9d4a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c572ea4c00bbf5b57f75082b7abc9d4a
-
SHA1
b607b459531d5d3629d83b74a3e7064ab0a5172d
-
SHA256
532c4a9fdcc00ccbbde0658accc2d5d76862011038a28136e5c19f312e1cd7a9
-
SHA512
8de6287aae880a643a3cd3a17315d8c739b3bf3ee31df224d7d979a7e7a8b758b7429b27ac0c2ed2752a77995d5e9c4552adcf71d0b13baca9fb5492f6059ead
-
SSDEEP
24576:BuYfg4LhHr4NFXKJO1aUyDBvZ2+ITXmpclO9d:T9cKrU6ZWbAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3348-4-0x00000000083A0000-0x00000000083A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
AgentService.exeMusNotificationUx.exebdechangepin.exepid Process 3532 AgentService.exe 2428 MusNotificationUx.exe 3396 bdechangepin.exe -
Loads dropped DLL 3 IoCs
Processes:
AgentService.exeMusNotificationUx.exebdechangepin.exepid Process 3532 AgentService.exe 2428 MusNotificationUx.exe 3396 bdechangepin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tdfoxulv = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Security\\s5rNi\\MusNotificationUx.exe" -
Processes:
rundll32.exeAgentService.exeMusNotificationUx.exebdechangepin.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AgentService.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MusNotificationUx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdechangepin.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3348 3348 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3348 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3348 wrote to memory of 2132 3348 97 PID 3348 wrote to memory of 2132 3348 97 PID 3348 wrote to memory of 3532 3348 98 PID 3348 wrote to memory of 3532 3348 98 PID 3348 wrote to memory of 1088 3348 99 PID 3348 wrote to memory of 1088 3348 99 PID 3348 wrote to memory of 2428 3348 100 PID 3348 wrote to memory of 2428 3348 100 PID 3348 wrote to memory of 4636 3348 101 PID 3348 wrote to memory of 4636 3348 101 PID 3348 wrote to memory of 3396 3348 102 PID 3348 wrote to memory of 3396 3348 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c572ea4c00bbf5b57f75082b7abc9d4a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:2132
-
C:\Users\Admin\AppData\Local\Lv1k0o\AgentService.exeC:\Users\Admin\AppData\Local\Lv1k0o\AgentService.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3532
-
C:\Windows\system32\MusNotificationUx.exeC:\Windows\system32\MusNotificationUx.exe1⤵PID:1088
-
C:\Users\Admin\AppData\Local\Lt9y\MusNotificationUx.exeC:\Users\Admin\AppData\Local\Lt9y\MusNotificationUx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2428
-
C:\Windows\system32\bdechangepin.exeC:\Windows\system32\bdechangepin.exe1⤵PID:4636
-
C:\Users\Admin\AppData\Local\lmGSJiX7\bdechangepin.exeC:\Users\Admin\AppData\Local\lmGSJiX7\bdechangepin.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD5869a214114a81712199f3de5d69d9aad
SHA1be973e4188eff0d53fdf0e9360106e8ad946d89f
SHA256405c2df9a36d7cfb5c8382c96f04792eb88c11a6cfa36b1d2ec3e0bec8d17361
SHA512befcdeb8de6e68b9ee0bacd4cbc80f7393a0213d4039b239c98585e0cd5db1755c75559a62372374cbfb7132b6a7973ea9e6a31952e0e0ba007079c56e6d9012
-
Filesize
1.2MB
MD59cd2d0d5c125f35c921404d3e75698a5
SHA1a739fd335819977adb8450547fd474798582a938
SHA256409b140d0c5f8acd43dc5a8ed925f634b1acf2d84c0eda2d3d4e969f5dff5405
SHA5123403a67638099015e709043709444e10279fc47a6ae758cf449b0efa7c3285670a40241771994790e9196d833e851f6bd2b909144ff6907b070f2f7823b4801f
-
Filesize
1.2MB
MD597250e9d250d833b7831a1071da6bfdb
SHA16181499aa285a8f1ec17e5c9b1f218d6718c46c5
SHA256d20af637eb024d380e51ae6af550db4c79e3018a2487038d65c1b7c28989b4a2
SHA512b7c91f9167dbe44546564235d5748b7aa11cbeb0b0fd0aa2f78902c93d4e8462ec84bd5298bfcfe77c1595f7569d9fc29586e27fdd2e8b81697097a01d2eb868
-
Filesize
1.2MB
MD5f8bac206def3e87ceb8ef3cb0fb5a194
SHA1a28ea816e7b5ca511da4576262a5887a75171276
SHA256c69e4520d5dd84a409c2df1825ba30ec367400e4f7b001c8e971da8bef1a2268
SHA5128df9a814c738e79492a3b72ba359bf3aedfb89fe02215ef58e743c541a2194ba47e227969d76c55387eee6eb367ca68e4b3cdf054022cb86e62376cc2fdef909
-
Filesize
1.4MB
MD529c19143ab5649cdf7689bbcf487c6c6
SHA1bd60487d0d077e10fe50592fa0c5a45e0492751e
SHA2567f3a3ea118c5d93e042e43bd6ba0ef774165337abb6ec268c532f0d15dbb68c4
SHA5129f256d28064600028a75d2c46fca0f3ac4c6eec3d30e335c648b1dfd2e920b3a7e3fa7b4f2d99afab0aabc0c6b65c94d90ab82fc5f541764ebf8573aa383a1d0
-
Filesize
373KB
MD5601a28eb2d845d729ddd7330cbae6fd6
SHA15cf9f6f9135c903d42a7756c638333db8621e642
SHA2564d43f37576a0ebbaf97024cd5597d968ffe59c871b483554aea302dccb7253f6
SHA5121687044612ceb705f79c806b176f885fd01449251b0097c2df70280b7d10a2b830ee30ac0f645a7e8d8067892f6562d933624de694295e22318863260222859d
-
Filesize
1023B
MD5059dee52c26a17c9fdf89e5ca04b1da5
SHA1433c1e6d93cf50f4f08c801a1fb0248ce48294b8
SHA256100514d2d8736398d518105606100cc79f67ee8eab757f7e29d1e62a6759a89b
SHA512cb4ac4d9b0442b1034d23615dbae821d254b94fe6fdeac745bb8ada98a5265da06d1452a0debf8c9aa8dd1d734753ed3e3f7beb2a2511df3ae5822722768ee4d