Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
c8baf35e81d9fdc69131c9ceba69f06a_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
c8baf35e81d9fdc69131c9ceba69f06a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c8baf35e81d9fdc69131c9ceba69f06a
-
SHA1
ad1495128510e0a7eadda3d4ede0a06c3744a46f
-
SHA256
21bd6ef058050b15306f88b3ce55c92df07610ac8025a9975c8aaa3a47a53ebf
-
SHA512
b46cad51d6d6a86609bd120b4b9effe3f715bdc7526682c846bf6301e9c2cfb041b8920301201398059c0385a1152669c7c7d6704599203e24b225ed5d970b9e
-
SSDEEP
24576:9uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Nat:X9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3552-4-0x0000000008270000-0x0000000008271000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 3908 SystemPropertiesRemote.exe 960 mblctr.exe 4776 FXSCOVER.exe -
Loads dropped DLL 3 IoCs
pid Process 3908 SystemPropertiesRemote.exe 960 mblctr.exe 4776 FXSCOVER.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tdfoxulv = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~2\\4BL3LR~1\\mblctr.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4792 rundll32.exe 4792 rundll32.exe 4792 rundll32.exe 4792 rundll32.exe 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 3552 Process not Found Token: SeCreatePagefilePrivilege 3552 Process not Found Token: SeShutdownPrivilege 3552 Process not Found Token: SeCreatePagefilePrivilege 3552 Process not Found Token: SeShutdownPrivilege 3552 Process not Found Token: SeCreatePagefilePrivilege 3552 Process not Found Token: SeShutdownPrivilege 3552 Process not Found Token: SeCreatePagefilePrivilege 3552 Process not Found Token: SeShutdownPrivilege 3552 Process not Found Token: SeCreatePagefilePrivilege 3552 Process not Found Token: SeShutdownPrivilege 3552 Process not Found Token: SeCreatePagefilePrivilege 3552 Process not Found Token: SeShutdownPrivilege 3552 Process not Found Token: SeCreatePagefilePrivilege 3552 Process not Found Token: SeShutdownPrivilege 3552 Process not Found Token: SeCreatePagefilePrivilege 3552 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3552 Process not Found 3552 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3552 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3552 wrote to memory of 232 3552 Process not Found 95 PID 3552 wrote to memory of 232 3552 Process not Found 95 PID 3552 wrote to memory of 3908 3552 Process not Found 96 PID 3552 wrote to memory of 3908 3552 Process not Found 96 PID 3552 wrote to memory of 8 3552 Process not Found 97 PID 3552 wrote to memory of 8 3552 Process not Found 97 PID 3552 wrote to memory of 960 3552 Process not Found 98 PID 3552 wrote to memory of 960 3552 Process not Found 98 PID 3552 wrote to memory of 1084 3552 Process not Found 99 PID 3552 wrote to memory of 1084 3552 Process not Found 99 PID 3552 wrote to memory of 4776 3552 Process not Found 100 PID 3552 wrote to memory of 4776 3552 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8baf35e81d9fdc69131c9ceba69f06a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵PID:232
-
C:\Users\Admin\AppData\Local\qR8OP\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\qR8OP\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3908
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:8
-
C:\Users\Admin\AppData\Local\gKqNu\mblctr.exeC:\Users\Admin\AppData\Local\gKqNu\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:960
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:1084
-
C:\Users\Admin\AppData\Local\PpeYJS7ZX\FXSCOVER.exeC:\Users\Admin\AppData\Local\PpeYJS7ZX\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD55769f78d00f22f76a4193dc720d0b2bd
SHA1d62b6cab057e88737cba43fe9b0c6d11a28b53e8
SHA25640e8e6dabfa1485b11cdccf220eb86eeaa8256e99e344cf2b2098d4cdb788a31
SHA512b4b3448a2635b21690c71254d964832e89bf947f7a0d32e79dcc84730f11d4afb4149a810a768878e52f88fc8baec45f1a2fec8e22c5301e9f39fe4fc6a57e3f
-
Filesize
1.2MB
MD5be52995913315d91cf2f458d618a9720
SHA1a30a34d0786dd0148011be32a4c76b83efa898e9
SHA256dfe45b9743f5125e708b1bef434d88fbf6a9f967d9e5e69030d37373557824ff
SHA51224d3f535d056df36d535e1319e396d57e2243bdd8a374a3dd6e3d40b26c4f4fd578adf5154079dae726e9aaf4b7830eb9a312e004a3c7ffa2ed7fb911edf40d4
-
Filesize
1.2MB
MD5d5e9e4bd5e5ba6e21ecba3a10e748dd2
SHA17660b8305f00d4468d6cb9c6bb69934007f0af66
SHA25605016ce80a093d589d7190d8226861bdd21d708bb1121b62624431e56576e6bf
SHA512c017d362d92d965ffa074695c42e8d1cf5789d54ec9b340d0cf6e0436b6ab0f25ace81ccd40f8bd6b8f71b43438b8c26e0b4629978a662e8e840f80536f59415
-
Filesize
790KB
MD5d3db14eabb2679e08020bcd0c96fa9f6
SHA1578dca7aad29409634064579d269e61e1f07d9dd
SHA2563baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69
SHA51214dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe
-
Filesize
1.2MB
MD5f4d58ecb13c5bd533b20e99067d78bf2
SHA1984412a577e63a08301e6b8e25abc7461fcdc834
SHA256f8a39e4cde0c066de09ac2b1283313d9fba07f4de0af9c7328e047fa81a3de0c
SHA512431051c5bffbf1422496492377727e7a474f1d914c7e2d40e0e69e60b1a9f1ba69666b8973a49d10ac4533bd14256046bbbfd94061bdeb11bd7a617c6a853ef7
-
Filesize
82KB
MD5cdce1ee7f316f249a3c20cc7a0197da9
SHA1dadb23af07827758005ec0235ac1573ffcea0da6
SHA2567984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932
SHA512f1dc529ebfed814adcf3e68041243ee02ba33b56c356a63eba5ef2cb6ede1eda192e03349f6a200d34dfab67263df79cf295be3706f4197b9008ccdc53410c26
-
Filesize
762B
MD599d6a18706b1a37220370ac0ffc7c21a
SHA1c60eb38b63b1080af34a75bd6c29abb1992ba9de
SHA25675c4cf3882dfd24f2985134939451312eb971de0a561d5f9a90d50a5aaafa63c
SHA512942201fefee3de8fb8919203df795613d2dd1fd89fdefd37a312e2c7a863eb5689a7f3de51ba06a77b0db59703f2410e09c0be74bc0d9bebdacfedd15a579749