Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 09:05
Static task
static1
Behavioral task
behavioral1
Sample
d60158a83044f3a9cfa793ff367a2974_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
d60158a83044f3a9cfa793ff367a2974_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
d60158a83044f3a9cfa793ff367a2974
-
SHA1
0da6da782bed9459503edc9a21ee5f6b7ec02c99
-
SHA256
150e6355b4e5d64291ad78878bba7d155a2e5412875e36866ead632f7d9c6d82
-
SHA512
11e61830d477990d7f361290af170844dd39d2e406e3e8b37234b3eb75d6ab21d1f2d353e96e8490a4497dc1892a66aaa639915d975e918baf9400b9f4fb6539
-
SSDEEP
24576:vuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:R9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3432-4-0x0000000008770000-0x0000000008771000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 4020 SystemSettingsAdminFlows.exe 4404 SystemPropertiesHardware.exe 2124 phoneactivate.exe -
Loads dropped DLL 3 IoCs
pid Process 4020 SystemSettingsAdminFlows.exe 4404 SystemPropertiesHardware.exe 2124 phoneactivate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qgfqnr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\CachedFiles\\DM0XO\\SystemPropertiesHardware.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsAdminFlows.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3432 Process not Found Token: SeCreatePagefilePrivilege 3432 Process not Found Token: SeShutdownPrivilege 3432 Process not Found Token: SeCreatePagefilePrivilege 3432 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3432 Process not Found 3432 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3432 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3432 wrote to memory of 4680 3432 Process not Found 94 PID 3432 wrote to memory of 4680 3432 Process not Found 94 PID 3432 wrote to memory of 4020 3432 Process not Found 95 PID 3432 wrote to memory of 4020 3432 Process not Found 95 PID 3432 wrote to memory of 2484 3432 Process not Found 96 PID 3432 wrote to memory of 2484 3432 Process not Found 96 PID 3432 wrote to memory of 4404 3432 Process not Found 97 PID 3432 wrote to memory of 4404 3432 Process not Found 97 PID 3432 wrote to memory of 3928 3432 Process not Found 98 PID 3432 wrote to memory of 3928 3432 Process not Found 98 PID 3432 wrote to memory of 2124 3432 Process not Found 99 PID 3432 wrote to memory of 2124 3432 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d60158a83044f3a9cfa793ff367a2974_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
C:\Windows\system32\SystemSettingsAdminFlows.exeC:\Windows\system32\SystemSettingsAdminFlows.exe1⤵PID:4680
-
C:\Users\Admin\AppData\Local\veosa\SystemSettingsAdminFlows.exeC:\Users\Admin\AppData\Local\veosa\SystemSettingsAdminFlows.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4020
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵PID:2484
-
C:\Users\Admin\AppData\Local\TGCHbZ7U\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\TGCHbZ7U\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4404
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵PID:3928
-
C:\Users\Admin\AppData\Local\QZH\phoneactivate.exeC:\Users\Admin\AppData\Local\QZH\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD595c424c0b10354893302c351f04b3d96
SHA1a272c27b729001b5723f27f27de00fa6c396de4f
SHA2569a88aa52e9e0b15ef7fab4a24780f63a49030655da5d624f9289d4691ef5963d
SHA51279af97c9bf54a1c33161fe5e4e7c60b3e569fc74f9a218ec0a0c1d31ed6d7d3292cb523f36ed884cc33ad06ff16b5e3fb2b2c2cc36575e76fc2311d1a5fc6cd6
-
Filesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
Filesize
1.2MB
MD52de2b537e384ef015887f3d9c3d0ba41
SHA1e1bd0b641cbfa85a4c5880fddddeaadf54065195
SHA25668a53eb0087a1b2b76d87cfdd216a6e0a907be222b9327d1d625c49b361c1934
SHA512753b22079cf5bb44de30141418343ae82101bb7dd60a616a40b35350fd1b2b3b079398baef668db7e4c596459e85fa7b2eb413bad5ac57e40d4acb3168d59083
-
Filesize
82KB
MD5bf5bc0d70a936890d38d2510ee07a2cd
SHA169d5971fd264d8128f5633db9003afef5fad8f10
SHA256c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7
SHA5120e129044777cbbf5ea995715159c50773c1818fc5e8faa5c827fd631b44c086b34dfdcbe174b105891ccc3882cc63a8664d189fb6a631d8f589de4e01a862f51
-
Filesize
506KB
MD550adb2c7c145c729b9de8b7cf967dd24
SHA1a31757f08da6f95156777c1132b6d5f1db3d8f30
SHA256a7a2e7122d27308df37b7ab718ef3ac239e4216669f51331e34e205f59fb0aec
SHA512715b4c93e79e896da1cf86cf4455a84cba1aeac34b6fd72d2afdf203a2034f6f8fac1d6501f0dd277a17bd1d7ab73ddd1887e01a99f2d26f39efeb94d0aac9b0
-
Filesize
1.2MB
MD5a9a5d0949114fb999e0d09e4d3b9c32c
SHA1a0d50bcfa136d037d9554105b0a86e31d170c640
SHA256ff61447a9f60097e4f2b3f139d84eea9dc2530928ac84683de10c6ebc28c7fbb
SHA5124ac05d9fae14ce24c06d18a703c8702d2c222a1502f2a90d2fe5ba12e189f6f1b4b19521e3fa7259cc8fe190779c0dc6303e3c0c408ac271d755abbf0eb613e5
-
Filesize
1KB
MD5ff537ea0fbe569eb798109a603103691
SHA1246ff3f7fbeb300ae379e79b19ec9be3999c38de
SHA2568626cb85e0b18c4b8fa67918d0e45d3620c1c16dcb8f7db1320c2e9c6ad39801
SHA512cfd152c779990192e23602bd7433e24be534a9a5314251e96f7fb317dab9a15e262c2f26359c8427d1afb7cecbc40ce4f2c8666cac1247d30c06362ab2253401