Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
ca3cbd4bb76e276967023dfcec4c8d65_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
ca3cbd4bb76e276967023dfcec4c8d65_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
ca3cbd4bb76e276967023dfcec4c8d65
-
SHA1
11733d1ced342598f9851031bea13e9b3a1022c9
-
SHA256
fc7250c2304197a28f68e088a7bb5fb90415ac996838166ce4fe4b2b797cc24a
-
SHA512
12dec455ff2e7a04ae68b066a15683894bd6c9bb6960839b1b971a554274672f34fdd8bbc6724aedf7367cae1a62e08427ba553783c050edc3314bdb08fc5949
-
SSDEEP
24576:QuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NMt:A9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3360-4-0x0000000002480000-0x0000000002481000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
MusNotificationUx.exeSysResetErr.exeunregmp2.exepid Process 2416 MusNotificationUx.exe 316 SysResetErr.exe 1696 unregmp2.exe -
Loads dropped DLL 3 IoCs
Processes:
MusNotificationUx.exeSysResetErr.exeunregmp2.exepid Process 2416 MusNotificationUx.exe 316 SysResetErr.exe 1696 unregmp2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isybexcquevfui = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\DOCUME~1\\1033\\URBRQ3~1\\SYSRES~1.EXE" -
Processes:
MusNotificationUx.exeSysResetErr.exeunregmp2.exerundll32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MusNotificationUx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 4900 rundll32.exe 4900 rundll32.exe 4900 rundll32.exe 4900 rundll32.exe 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3360 Token: SeCreatePagefilePrivilege 3360 Token: SeShutdownPrivilege 3360 Token: SeCreatePagefilePrivilege 3360 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3360 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3360 wrote to memory of 2668 3360 94 PID 3360 wrote to memory of 2668 3360 94 PID 3360 wrote to memory of 2416 3360 95 PID 3360 wrote to memory of 2416 3360 95 PID 3360 wrote to memory of 1272 3360 96 PID 3360 wrote to memory of 1272 3360 96 PID 3360 wrote to memory of 316 3360 97 PID 3360 wrote to memory of 316 3360 97 PID 3360 wrote to memory of 440 3360 98 PID 3360 wrote to memory of 440 3360 98 PID 3360 wrote to memory of 1696 3360 99 PID 3360 wrote to memory of 1696 3360 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca3cbd4bb76e276967023dfcec4c8d65_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
C:\Windows\system32\MusNotificationUx.exeC:\Windows\system32\MusNotificationUx.exe1⤵PID:2668
-
C:\Users\Admin\AppData\Local\1V2M3C\MusNotificationUx.exeC:\Users\Admin\AppData\Local\1V2M3C\MusNotificationUx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2416
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵PID:1272
-
C:\Users\Admin\AppData\Local\BIi\SysResetErr.exeC:\Users\Admin\AppData\Local\BIi\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:316
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:440
-
C:\Users\Admin\AppData\Local\r50z\unregmp2.exeC:\Users\Admin\AppData\Local\r50z\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD5869a214114a81712199f3de5d69d9aad
SHA1be973e4188eff0d53fdf0e9360106e8ad946d89f
SHA256405c2df9a36d7cfb5c8382c96f04792eb88c11a6cfa36b1d2ec3e0bec8d17361
SHA512befcdeb8de6e68b9ee0bacd4cbc80f7393a0213d4039b239c98585e0cd5db1755c75559a62372374cbfb7132b6a7973ea9e6a31952e0e0ba007079c56e6d9012
-
Filesize
1.2MB
MD5c4fecb04dd0d872d00beccd7fa121ccd
SHA11ff5266cf27f82202b2cc3cf4733edbcc27e4ef3
SHA25690f33f851cb56e55b0396a0b40a0d300a0af3d818833aaef1edb24967f3d9f00
SHA5124dfe7ed5ea414dff38f7cc2b11e0b70abe82c7d01f4f310ce45505b468187aff92d8c3d736e725aa7688b906391c26a8741ff2570293444c0227888dd8658da8
-
Filesize
1.4MB
MD5c253f9d02a22ce85193fcc34c6448a27
SHA1babe77e41168bc98230a33592f639307ddbe3280
SHA2562e040964fab779e3dc342a8f5b1053aaeda43a2377d886e34fca642779c18426
SHA512dbfe9f10ee6c5a4a38724b9a11f2239e2fc2e68ed44c22cd86405ba8ef90bbebd89fe8fa8f3b555680d9c5e0a439fb5a3767aa70981198a76b31d993dfc41514
-
Filesize
41KB
MD5090c6f458d61b7ddbdcfa54e761b8b57
SHA1c5a93e9d6eca4c3842156cc0262933b334113864
SHA256a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd
SHA512c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542
-
Filesize
1.2MB
MD5041f4d51841873273c536418b82f2a56
SHA16e251c3458242453cbd5801691fe60602539ab07
SHA2564b0cbdd7728e01cdfc1fc29dc45312ba6c109c1183bd7576b91f1adbcefc2aee
SHA51263e70d1fbd01bdd1542f7925a7c073d4e85bda3f2c009bca754336e2487e9578643c90b869c88a594d2441f7370a2c005ab1a5a459ae594d3e4ae7e722dbf5c1
-
Filesize
259KB
MD5a6fc8ce566dec7c5873cb9d02d7b874e
SHA1a30040967f75df85a1e3927bdce159b102011a61
SHA25621f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d
SHA512f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc
-
Filesize
1KB
MD557f5631493cba88aac778a1e56165542
SHA1d0cf340a08401987bc89d099d27cda2de39c99a0
SHA25634958de22b8882981600a2dc47cfcea23030e43dfe94d59c5cbc8f48708d111d
SHA512effc4914fff3462b0984ef7fb63ce413b2229899c99bff08488f0fc33dabaaeeb69ff44b3511da04ea4d11a34ce83b2995f9fe69d6d6dcc860cab48c5d653e41