Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
c8c93bdec2879a4b3c23f3a3c8758777_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
c8c93bdec2879a4b3c23f3a3c8758777_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
c8c93bdec2879a4b3c23f3a3c8758777
-
SHA1
df26f9d9073ad61740eedd00a48446100c929761
-
SHA256
d00def281b5d4e5f7279628c9c4bef32598d7d476f8a3c7bcd44a7eaf47b9ca1
-
SHA512
90daab81877824c9846686f0f9ee8e762e1485e6dd2d82db8a5a2414a73188857a3031ecf5b4f4ba82006dc08ffcf64d47f6de44421fb147ed727f63d12b3f2e
-
SSDEEP
24576:4uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:I9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3588-4-0x00000000085D0000-0x00000000085D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1640 mfpmp.exe 460 isoburn.exe 4460 DevicePairingWizard.exe -
Loads dropped DLL 3 IoCs
pid Process 1640 mfpmp.exe 460 isoburn.exe 4460 DevicePairingWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wdtbxtklooytt = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Templates\\LiveContent\\16\\Managed\\ovLIKF9Tpj\\isoburn.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4596 rundll32.exe 4596 rundll32.exe 4596 rundll32.exe 4596 rundll32.exe 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3588 Process not Found 3588 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3588 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3068 3588 Process not Found 95 PID 3588 wrote to memory of 3068 3588 Process not Found 95 PID 3588 wrote to memory of 1640 3588 Process not Found 96 PID 3588 wrote to memory of 1640 3588 Process not Found 96 PID 3588 wrote to memory of 436 3588 Process not Found 97 PID 3588 wrote to memory of 436 3588 Process not Found 97 PID 3588 wrote to memory of 460 3588 Process not Found 98 PID 3588 wrote to memory of 460 3588 Process not Found 98 PID 3588 wrote to memory of 3636 3588 Process not Found 99 PID 3588 wrote to memory of 3636 3588 Process not Found 99 PID 3588 wrote to memory of 4460 3588 Process not Found 100 PID 3588 wrote to memory of 4460 3588 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8c93bdec2879a4b3c23f3a3c8758777_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:3068
-
C:\Users\Admin\AppData\Local\13XlbmX\mfpmp.exeC:\Users\Admin\AppData\Local\13XlbmX\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1640
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵PID:436
-
C:\Users\Admin\AppData\Local\h4a11mLM\isoburn.exeC:\Users\Admin\AppData\Local\h4a11mLM\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:460
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:3636
-
C:\Users\Admin\AppData\Local\xpAuWKN\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\xpAuWKN\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5a8c46c7b7041af5ad4ba778b626d5538
SHA110f1961ea7d6411d95d988fab2131a9ec05fe6ea
SHA25637c588d67702076dec8a5c80c90b8398b476c6553b7f984ed9872bcae5dd8ecc
SHA512e0c06d3687dd6a5c8a08c9f0a51928570bdb80f7a68068da00fd4c958d0340990b8d95e8bfef4160dd5d858c8550fe797c98770f649226f17aa0c2915e95cc95
-
Filesize
46KB
MD58f8fd1988973bac0c5244431473b96a5
SHA1ce81ea37260d7cafe27612606cf044921ad1304c
SHA25627287ac874cef86be03aee7b6d34fdc3bd208070ed20e44621a305865fb7579e
SHA512a91179e1561168b3b58f5ca893bce425d35f4a02aec20ac3d6fb944f5eb3c06b0a1b9d9f3fb9ea87869d65671d2b89b4ae19acf794372bdbd27f5e9756c5a8ab
-
Filesize
1.4MB
MD56cde4cc62f6bc0b53e74f9f1c8f25ab9
SHA111adf47b3a760d1e6fb2854f803fa3a379bbf6bf
SHA256b9aebc1c4e2aeeb98072a76ba824f70d821d3cdfa8704f38b4d7d85f66ce7f60
SHA5127786452a2c64af1ecb9bc4d418900afdca488d960a30c556cc00ad280105f2d284bced1933856863af71845eb625ec0b7856206631f19835ee3b03f87d3fa6d5
-
Filesize
119KB
MD568078583d028a4873399ae7f25f64bad
SHA1a3c928fe57856a10aed7fee17670627fe663e6fe
SHA2569478c095afe212bce91d2de1a3c3647109f2d54e46b9bf70843e839324458567
SHA51225503a47c53fe83eeb56726b5a5eec5cb01bc783e866306f92242a7a8cbafa20a3209217e0f4561febfec78d2f64f1725727a6b2d3ee6da512618984d0bb0bc1
-
Filesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
Filesize
1.4MB
MD516e3209d933f025d069fe3e4c17ec0d6
SHA1edd2e83f7fc547463b0e7d808374d6a5a7ea0ccb
SHA2568b02d7b4f9b4ceb6c6c11b358b74d39cda5006dec69f7066a47d03d2e0130859
SHA512cb42a1a254abfa5096a265de0c0445801a5c78542528f9d46bc008d406a86c1ac2cbc2e8fba79929a43048e15bf0158bf7fffd556c75c2932875ff669be19126
-
Filesize
1KB
MD58cc7f23f6fada493e9ba21a42d0abdd6
SHA16a35fdfd633f2af06713c30ff87198295a0c4965
SHA256eb27cfa34f7dce019298d3e82cfe6c1c0a89625d72e959057f937cbb314f9a4d
SHA51258f02a133f3f028d1dd1853f2d243406d619108703d5c69bdfbee01b5a6d0c13593374ccd0273ede0a80f495777d351fcca5f2c9bb3b80302acfeaef23a6cb16