Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
d61f5b5b8dafce129496a33195e5842b_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d61f5b5b8dafce129496a33195e5842b_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
d61f5b5b8dafce129496a33195e5842b
-
SHA1
c165d40db3e1414e961795118dece8d52b686e81
-
SHA256
624fd6a2c2a29a89d845271773a63a2950d9e12759de4910e0dd2ad5685e8476
-
SHA512
0929356ae9dc07a9e06f109da209500a440fa60411f34ae6bce955ce44e7642e8dea450049bd3cd5ff7ed1ad37eeba294091d1ec6ea8eb8c1f4e7804f87f7546
-
SSDEEP
12288:tdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0TGu:DMIJxSDX3bqjhcfHk7MzH6zl
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3504-3-0x0000000007CF0000-0x0000000007CF1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/2252-1-0x0000000140000000-0x0000000140117000-memory.dmp dridex_payload behavioral2/memory/3504-45-0x0000000140000000-0x0000000140117000-memory.dmp dridex_payload behavioral2/memory/3504-57-0x0000000140000000-0x0000000140117000-memory.dmp dridex_payload behavioral2/memory/2252-59-0x0000000140000000-0x0000000140117000-memory.dmp dridex_payload behavioral2/memory/5060-66-0x0000000140000000-0x0000000140118000-memory.dmp dridex_payload behavioral2/memory/5060-71-0x0000000140000000-0x0000000140118000-memory.dmp dridex_payload behavioral2/memory/4084-87-0x0000000140000000-0x0000000140118000-memory.dmp dridex_payload behavioral2/memory/3636-103-0x0000000140000000-0x0000000140118000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
ddodiag.exeLockScreenContentServer.exeCloudNotifications.exepid process 5060 ddodiag.exe 4084 LockScreenContentServer.exe 3636 CloudNotifications.exe -
Loads dropped DLL 3 IoCs
Processes:
ddodiag.exeLockScreenContentServer.exeCloudNotifications.exepid process 5060 ddodiag.exe 4084 LockScreenContentServer.exe 3636 CloudNotifications.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qebzqfuc = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\FG\\LockScreenContentServer.exe" -
Processes:
ddodiag.exeLockScreenContentServer.exeCloudNotifications.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ddodiag.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LockScreenContentServer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 2252 regsvr32.exe 2252 regsvr32.exe 2252 regsvr32.exe 2252 regsvr32.exe 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3504 Token: SeCreatePagefilePrivilege 3504 Token: SeShutdownPrivilege 3504 Token: SeCreatePagefilePrivilege 3504 Token: SeShutdownPrivilege 3504 Token: SeCreatePagefilePrivilege 3504 Token: SeShutdownPrivilege 3504 Token: SeCreatePagefilePrivilege 3504 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3504 3504 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3504 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3504 wrote to memory of 2448 3504 ddodiag.exe PID 3504 wrote to memory of 2448 3504 ddodiag.exe PID 3504 wrote to memory of 5060 3504 ddodiag.exe PID 3504 wrote to memory of 5060 3504 ddodiag.exe PID 3504 wrote to memory of 2156 3504 LockScreenContentServer.exe PID 3504 wrote to memory of 2156 3504 LockScreenContentServer.exe PID 3504 wrote to memory of 4084 3504 LockScreenContentServer.exe PID 3504 wrote to memory of 4084 3504 LockScreenContentServer.exe PID 3504 wrote to memory of 932 3504 CloudNotifications.exe PID 3504 wrote to memory of 932 3504 CloudNotifications.exe PID 3504 wrote to memory of 3636 3504 CloudNotifications.exe PID 3504 wrote to memory of 3636 3504 CloudNotifications.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d61f5b5b8dafce129496a33195e5842b_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
C:\Windows\system32\ddodiag.exeC:\Windows\system32\ddodiag.exe1⤵PID:2448
-
C:\Users\Admin\AppData\Local\SR1zm\ddodiag.exeC:\Users\Admin\AppData\Local\SR1zm\ddodiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5060
-
C:\Windows\system32\LockScreenContentServer.exeC:\Windows\system32\LockScreenContentServer.exe1⤵PID:2156
-
C:\Users\Admin\AppData\Local\ahclpB8\LockScreenContentServer.exeC:\Users\Admin\AppData\Local\ahclpB8\LockScreenContentServer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4084
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵PID:932
-
C:\Users\Admin\AppData\Local\rM2ksr\CloudNotifications.exeC:\Users\Admin\AppData\Local\rM2ksr\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5eb60e805a87fe94302d1deef7f44745f
SHA104f7ae8fafd2009b085818deaf7f4efcf3445857
SHA2565e2478c0b783df5a24f1a83545979ea966bd318844aff58aaa8d92eaea90767e
SHA5123fea8c89505ba14014c65025e8879a67b0b6bd4b760d239195452b2e662cf4ab2964565870a129defea764776f074a4a9e61d3cfc9c8197d2b25b8c6c100aa9f
-
Filesize
39KB
MD585feee634a6aee90f0108e26d3d9bc1f
SHA1a7b1fa32fe7ed67bd51dea438f2f767e3fef0ca2
SHA25699c63175504781e9278824d487da082da7c014e99f1024227af164986d3a27c6
SHA512b81a3e1723a5180c5168cd7bb5181c631f4f57c59780bb82a502160b7874777f3eef1ebe1b14f66c97f9f1a4721af13b6fbcdff2045c8563c18b5d12540953ff
-
Filesize
47KB
MD5a0b7513c98cf46ca2cea3a567fec137c
SHA12307fc8e3fc620ea3c2fdc6248ad4658479ba995
SHA256cb2278884f04fd34753f7a20e5865ef5fc4fa47c28df9ac14ad6e922713af8c6
SHA5123928485a60ffa7f2d2b7d0be51863e1f8197578cfb397f1086a1ab5132843a23bbc4042b04b5d01fafad04878bd839161fa492d0cf1a6bac6be92023cdee3d15
-
Filesize
1.1MB
MD5cdf11673fc644001e6fdb4b183f89ad1
SHA13444019f3121939e6aae10dbd728f3ee22ebe3a7
SHA256b08e455927459633748195c38261a922cb335f22bd5560d759e779880a16537d
SHA512f02fb7d615133667b570e980b722d4983915c556535173c8acd246e181228a1268129499e52fe0d36f76269ede3832a7de720e0593d4c096cedc2537a2441cb1
-
Filesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
Filesize
1.1MB
MD5cf9a7ef85c9598ea76be6788396792fd
SHA1c82cc3e17d5d90370c8c1fff2a767c26e8b597ee
SHA256d3e67cecf8403919325b651ab5f5a6123b908ed4fd1acc7666ecfa4dc74255b0
SHA5128458bfe1551bb438b9a6d36fe2dd900fba17fda0a6329697c49143651a03185fc3b4c36abe34b3550ea96cfb877dd6b6edba9b49928a074927271a233e866053
-
Filesize
1KB
MD53891ec771a822ef20c9245c549db3f36
SHA129d3215d99b12455f83ed8edfc4238c1c41d7e4d
SHA25661d55a21ed5c39c2fc3c699adb85fb52f90edde689da557a25ea051bdf9f845b
SHA5129e916e7b62b9b9b803ed257112b6888e66c9fd0bc03dc69b10731a63df3c735298819ac04e5b36458f32442116fb1c0f9cea6a600d3eb2f6c1cbfb196dca9122