Analysis
-
max time kernel
149s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
cf42baf701af133c3b5644942b098edd_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf42baf701af133c3b5644942b098edd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cf42baf701af133c3b5644942b098edd_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
cf42baf701af133c3b5644942b098edd
-
SHA1
fa131bba515e453c67ecb025dfd4f8f2d76a01bc
-
SHA256
912ee7943db3b7e80cca61c022154f0fc13ef29ff948a89bbc87ed1b2938ac94
-
SHA512
873c88128d15175aed92577de51d2113723f00fb10358551affa4764e619707a453d25f2d3f3d5a028dfd9784cabb051916424dfde4df87aa2a0ee34beaae750
-
SSDEEP
24576:9uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:X9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3400-4-0x0000000003050000-0x0000000003051000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
AtBroker.exeeudcedit.exeddodiag.exepid Process 1192 AtBroker.exe 2872 eudcedit.exe 3252 ddodiag.exe -
Loads dropped DLL 3 IoCs
Processes:
AtBroker.exeeudcedit.exeddodiag.exepid Process 1192 AtBroker.exe 2872 eudcedit.exe 3252 ddodiag.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tdfoxulv = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\h07ZvdxBD1\\eudcedit.exe" -
Processes:
ddodiag.exerundll32.exeAtBroker.exeeudcedit.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ddodiag.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AtBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 4804 rundll32.exe 4804 rundll32.exe 4804 rundll32.exe 4804 rundll32.exe 4804 rundll32.exe 4804 rundll32.exe 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3400 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3400 wrote to memory of 2468 3400 93 PID 3400 wrote to memory of 2468 3400 93 PID 3400 wrote to memory of 1192 3400 94 PID 3400 wrote to memory of 1192 3400 94 PID 3400 wrote to memory of 1332 3400 95 PID 3400 wrote to memory of 1332 3400 95 PID 3400 wrote to memory of 2872 3400 96 PID 3400 wrote to memory of 2872 3400 96 PID 3400 wrote to memory of 4636 3400 97 PID 3400 wrote to memory of 4636 3400 97 PID 3400 wrote to memory of 3252 3400 98 PID 3400 wrote to memory of 3252 3400 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf42baf701af133c3b5644942b098edd_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
C:\Windows\system32\AtBroker.exeC:\Windows\system32\AtBroker.exe1⤵PID:2468
-
C:\Users\Admin\AppData\Local\BwoDxEr\AtBroker.exeC:\Users\Admin\AppData\Local\BwoDxEr\AtBroker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1192
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:1332
-
C:\Users\Admin\AppData\Local\C9pY6\eudcedit.exeC:\Users\Admin\AppData\Local\C9pY6\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2872
-
C:\Windows\system32\ddodiag.exeC:\Windows\system32\ddodiag.exe1⤵PID:4636
-
C:\Users\Admin\AppData\Local\DPKucxB2\ddodiag.exeC:\Users\Admin\AppData\Local\DPKucxB2\ddodiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3252
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD530076e434a015bdf4c136e09351882cc
SHA1584c958a35e23083a0861421357405afd26d9a0c
SHA256ae7b1e298a6e38f0a3428151bfc5565ede50a8d98dafaa147b13cf89c61f2ddd
SHA512675e310c2455acf9220735f34fa527afe87dac691e89cc0edc3c4659147e9fd223f96b7a3beea532047aa0ebc58880a7010343019a50aa73ce69a038e3592024
-
Filesize
1.2MB
MD569a1e2f329b4e4170c666bcd8ae295ae
SHA151c96e0822fe15a30da8f37a072d2bb6d0270402
SHA25665925f3b45676aeb82237c821f43c9ca96996223d952e41ef81c1451b9983b74
SHA512c14d69c81cecf28f6e06e32fb63e962049b414c63251cd69de6d6eb817274bf1b094f757a916338608aa59c36f76d21be7e5d2931858ffdaef624840f2b9e92f
-
Filesize
1.2MB
MD51877c843a76b6e9773a8d622362daa98
SHA199f3e0014282bb97add8796652638bdcec3de494
SHA2563c2c9092f28c5d2c92295be2a8e47cc9cac56549bc3970e7c67ad9ee5bda3db6
SHA512dc415e4063fc094ed3a4218424c41a0fb824b0f725d8dbcecab07fe87ece9460672912fae0d2d2714ae70e199cb791c812fa9495d6ca44522a09545d64f13f13
-
Filesize
365KB
MD5a9de6557179d371938fbe52511b551ce
SHA1def460b4028788ded82dc55c36cb0df28599fd5f
SHA25683c8d1a7582b24b4bbc0d453c813487185c2b05c483bd1759ef647a7e7e92dfe
SHA5125790cac8dae16a785b48f790e6645b137f211c1587fb64ea88e743b846ff3a886324afcfef4bebc61f869023b9a22ba925c461dfb2e12497b70f501e6b79153c
-
Filesize
1.2MB
MD5a2cc2d5c1d5f93081bbc3b1ecfb81c71
SHA103610827f2625c19645ffd2a77766fa142f76204
SHA2567985cc32cff5cafecdbfe7eabf131af880f7ea8d112e6990f7623a5d8aa214ab
SHA512e588b3826daf2dd9edad0261fc54911e14a93b31545e1607bcd6476162cdf624b3825048a6428b6be1ecd7c4cbf4bd9ec855ab1472fc32863c258a02bdbda664
-
Filesize
39KB
MD585feee634a6aee90f0108e26d3d9bc1f
SHA1a7b1fa32fe7ed67bd51dea438f2f767e3fef0ca2
SHA25699c63175504781e9278824d487da082da7c014e99f1024227af164986d3a27c6
SHA512b81a3e1723a5180c5168cd7bb5181c631f4f57c59780bb82a502160b7874777f3eef1ebe1b14f66c97f9f1a4721af13b6fbcdff2045c8563c18b5d12540953ff
-
Filesize
1KB
MD5996161abcb167e02ffdecd28cc29ae49
SHA18dc1f612e067a5b9d03a848337356289c6e7826b
SHA2566bc7a8b999bf09077aba1da731d447aaa59c85350cd11b384386fb4867896615
SHA5122c9ff0be4f2016f68bb9b55c9dc9b9a001b8626f059aa2a7b48a80d7cf9c7504e1792631ebe6b286427e98634e028c80ce331f335b2a4ef816d513902c46a97f