Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
d97f80ce2a0f7b494b57d1cbb0540816_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
d97f80ce2a0f7b494b57d1cbb0540816_JaffaCakes118.dll
-
Size
988KB
-
MD5
d97f80ce2a0f7b494b57d1cbb0540816
-
SHA1
977f98ba04fb23584f8da01712f1bbc6c0737c3c
-
SHA256
838304ff62d092eadc72ce5443f3e1a93cd10520de99a9bc9cd04376c205505c
-
SHA512
e246b2d4d92262d6dfecbd755781b1655f816d2913ad1998491fb3062081adc400c4bcde7bcdb78c917ed7e5b0b97daf0769d56b1d414c90234f90372f58663f
-
SSDEEP
24576:LVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:LV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3440-4-0x0000000008AA0000-0x0000000008AA1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 384 BdeUISrv.exe 1240 MoUsoCoreWorker.exe 2676 BdeUISrv.exe -
Loads dropped DLL 3 IoCs
pid Process 384 BdeUISrv.exe 1240 MoUsoCoreWorker.exe 2676 BdeUISrv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qebzqfuc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\WINDOW~1\\HG3HTFeC\\MOUSOC~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MoUsoCoreWorker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 rundll32.exe 2512 rundll32.exe 2512 rundll32.exe 2512 rundll32.exe 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3440 Process not Found 3440 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3392 3440 Process not Found 94 PID 3440 wrote to memory of 3392 3440 Process not Found 94 PID 3440 wrote to memory of 384 3440 Process not Found 95 PID 3440 wrote to memory of 384 3440 Process not Found 95 PID 3440 wrote to memory of 4256 3440 Process not Found 96 PID 3440 wrote to memory of 4256 3440 Process not Found 96 PID 3440 wrote to memory of 1240 3440 Process not Found 97 PID 3440 wrote to memory of 1240 3440 Process not Found 97 PID 3440 wrote to memory of 3980 3440 Process not Found 98 PID 3440 wrote to memory of 3980 3440 Process not Found 98 PID 3440 wrote to memory of 2676 3440 Process not Found 99 PID 3440 wrote to memory of 2676 3440 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d97f80ce2a0f7b494b57d1cbb0540816_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:3392
-
C:\Users\Admin\AppData\Local\2C1Ffd6\BdeUISrv.exeC:\Users\Admin\AppData\Local\2C1Ffd6\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:384
-
C:\Windows\system32\MoUsoCoreWorker.exeC:\Windows\system32\MoUsoCoreWorker.exe1⤵PID:4256
-
C:\Users\Admin\AppData\Local\qxsH\MoUsoCoreWorker.exeC:\Users\Admin\AppData\Local\qxsH\MoUsoCoreWorker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1240
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:3980
-
C:\Users\Admin\AppData\Local\6fywtC\BdeUISrv.exeC:\Users\Admin\AppData\Local\6fywtC\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD58595075667ff2c9a9f9e2eebc62d8f53
SHA1c48b54e571f05d4e21d015bb3926c2129f19191a
SHA25620b05c77f898be08737082e969b39f54fa39753c8c0a06142eb7ad5e0764a2db
SHA512080dbcdd9234c07efe6cea4919ffa305fdc381ccebed9d1020dd6551b54e20e52387e62a344502fa4a85249defd0f9b506528b8dd34675bc9f51f664b8fc4d88
-
Filesize
990KB
MD520b13c8cf0209db6cba55806b16e2d0a
SHA1d54ede2750354f6d4ac08ef012beee4fd19584ae
SHA2567c0634b84ba0ccd1d42a6622a1a4e6bb332863a715cb5dcc8156553e711ff459
SHA51261519902f41c511fad81555ed7ae9b0e22e5807d55b14da1a58909a1a6d0e0b2f00d1da32f4ae6ef43c1c681e03b6ad0fa8ca55fc027ea228cd834bf49e6ceac
-
Filesize
990KB
MD5efce20a990d9383b42e156286d35e83b
SHA18a2ca333b9b939d2608f719e3bbdf4b00a13a4d1
SHA256f7a7d00dda62e26ebee32a950f104bb6ef1ab94a270364cd0f598170186ecb20
SHA5125d2ae9b3ee33b12fd5c90759c493782a688821402fb6ad696d5f39f9a9c7f5b6bf77dcac6eda9ea56f4448f99af5225ffa2836bcf77b546a751c5aaa27f51c26
-
Filesize
1.6MB
MD547c6b45ff22b73caf40bb29392386ce3
SHA17e29a8d98fbb9b02d3d22e3576f4fd61ab50ffe9
SHA256cbccb642725edb42e749e26ded68a16b3aa20e291a1a7793a2d4efebb75f99c0
SHA512c919ab84a497616e7969d58c251f4e6efc337b41ef6956864b86d66ae1437294c124232fec54433eab3a6518ed529f8445dd0b23706b2f42f3fa42e69711f331
-
Filesize
988KB
MD55649f63fc0c0dfe5a1c55f2b61beb0bf
SHA1b6dfca32df2966baf26ef421dbd6ffc60a84567c
SHA2565ed923b8b46482560591990626fa9b0b8fb7dfe5bf483677c61db4def26a507d
SHA512e53ade9c82df735cb53a2ed4ff8df2b7e9a53d67a59456b05e4a3b67ae9007beac596fe5157f9d6f22e7cd7e24091bb1c6502b38036f46bb9b29e037d3e24263
-
Filesize
1KB
MD55f6c42e4c2a07434b0c9b7fc9b8161de
SHA10291c2190366eb84a00bcf22b0a466e13879604f
SHA256a7c027c83d4bdacb4a29186f510fd578b3cb598ff831bdaee84a957a71f81e98
SHA512ed054ec1686642a81986656eec3ef3fa2eebf49ea8346b5628cc22d77a36494cc53e93c82536dfac8e6b0fe0803d8c0b7a8dd77af839c26a795180426c598cd0