Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
dc2d104b67fcae0ddd6dc0e18b8faaeb_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
dc2d104b67fcae0ddd6dc0e18b8faaeb_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
dc2d104b67fcae0ddd6dc0e18b8faaeb
-
SHA1
7e2e76bdcd59fa3a06550be0cf8765368cb1c3ad
-
SHA256
acb6b390306be1fe78e2453843386ac52bf9599741957edd013e9c5ea276e467
-
SHA512
d61af34102337e7e34f663471c0b8d97887fc275921ef23465cfc105ac1288087ef2e7908b2d3382b1a3564bdd1e0f37f542cc415824f6b5107999a2cfaf5cd8
-
SSDEEP
24576:0uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:s9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3492-4-0x0000000007F40000-0x0000000007F41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
GamePanel.exeWindowsActionDialog.exewextract.exepid process 3556 GamePanel.exe 2400 WindowsActionDialog.exe 5112 wextract.exe -
Loads dropped DLL 3 IoCs
Processes:
GamePanel.exeWindowsActionDialog.exewextract.exepid process 3556 GamePanel.exe 2400 WindowsActionDialog.exe 5112 wextract.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qebzqfuc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\Keys\\1ddo1\\WindowsActionDialog.exe" -
Processes:
rundll32.exeGamePanel.exeWindowsActionDialog.exewextract.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsActionDialog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2172 rundll32.exe 2172 rundll32.exe 2172 rundll32.exe 2172 rundll32.exe 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3492 Token: SeCreatePagefilePrivilege 3492 Token: SeShutdownPrivilege 3492 Token: SeCreatePagefilePrivilege 3492 Token: SeShutdownPrivilege 3492 Token: SeCreatePagefilePrivilege 3492 Token: SeShutdownPrivilege 3492 Token: SeCreatePagefilePrivilege 3492 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3492 3492 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3492 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3492 wrote to memory of 2152 3492 GamePanel.exe PID 3492 wrote to memory of 2152 3492 GamePanel.exe PID 3492 wrote to memory of 3556 3492 GamePanel.exe PID 3492 wrote to memory of 3556 3492 GamePanel.exe PID 3492 wrote to memory of 3564 3492 WindowsActionDialog.exe PID 3492 wrote to memory of 3564 3492 WindowsActionDialog.exe PID 3492 wrote to memory of 2400 3492 WindowsActionDialog.exe PID 3492 wrote to memory of 2400 3492 WindowsActionDialog.exe PID 3492 wrote to memory of 4336 3492 wextract.exe PID 3492 wrote to memory of 4336 3492 wextract.exe PID 3492 wrote to memory of 5112 3492 wextract.exe PID 3492 wrote to memory of 5112 3492 wextract.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc2d104b67fcae0ddd6dc0e18b8faaeb_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵PID:2152
-
C:\Users\Admin\AppData\Local\pVhB\GamePanel.exeC:\Users\Admin\AppData\Local\pVhB\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3556
-
C:\Windows\system32\WindowsActionDialog.exeC:\Windows\system32\WindowsActionDialog.exe1⤵PID:3564
-
C:\Users\Admin\AppData\Local\qmzZtx\WindowsActionDialog.exeC:\Users\Admin\AppData\Local\qmzZtx\WindowsActionDialog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2400
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵PID:4336
-
C:\Users\Admin\AppData\Local\mu7\wextract.exeC:\Users\Admin\AppData\Local\mu7\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD580ab9571916942ff7fb0394e37fca1bb
SHA18d5089c6a1d63301bc6c32947b19b08d7d3bb3d7
SHA256a621638232feaf7b54e4f1c9a0c84b7fee912a2fb0c98b5cb84ba199e7cbf9ac
SHA5122c2ced4abd6c79511dccb67f3c60865535fdd9552a7802736d3222dff19bc2013ab651ff843b6e3bcb4cb3eda5bb303d4963ccda04c1db5af3673d17bc85fdff
-
Filesize
143KB
MD556e501e3e49cfde55eb1caabe6913e45
SHA1ab2399cbf17dbee7b302bea49e40d4cee7caea76
SHA256fbb6dc62abeeb222b49a63f43dc6eea96f3d7e9a8da55381c15d57a5d099f3e0
SHA5122b536e86cbd8ab026529ba2c72c0fda97e9b6f0bc4fd96777024155852670cb41d17937cde372a44cdbad3e53b8cd3ef1a4a3ee9b34dfb3c2069822095f7a172
-
Filesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
Filesize
1.2MB
MD5ae71b3f9255a904f4868aa46ea0c5f4c
SHA1224f205adca8ff2d6bc6669e187bfa2c3ab1e1c5
SHA2561f4b62979296e2f8d54ed15870830e49dccc72a88ba530819960d16d220a5c4a
SHA51201a59bbd91a4a5a9214fb4ac00796048da33dd822e01cd2469d0137de76f4376b85e5c18cdd9ffc4fef021ef6496667d980f829badc393bf5b4c8251da608b94
-
Filesize
1.4MB
MD5d6ecf59aeb1965a7007d8a994fc9f770
SHA10a9585f1fcd8141bfa6b08d06f0a996c2cefbd52
SHA256bd63a9fa45c1c676e507e475e409657833b2a98ebf7043cc9608fea011772e2c
SHA51262b7ee375a45dc50a77d638e5a2f7f44469f07fa2cadf0d2185508af3f8e63388a6c2b49c49ecea10c00e7c2fd913ea50514f158ae7b375208b01a4e837b8895
-
Filesize
61KB
MD573c523b6556f2dc7eefc662338d66f8d
SHA11e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5
SHA2560c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31
SHA51269d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912
-
Filesize
998B
MD57c5521a4a874a178a335d26b29187812
SHA1a81249fcc9efab1512f8b4b515da5c9ce3a8477c
SHA2560e190369fb3e4f72679966bc80d03fb38d69fa0602c15996fd9605ca1b04fa18
SHA5121ae2bdad757c0796ac83a6aac738890cc63757ccc9d37c10938b1777da9aabe529649ed175a5a32d3e1d253180f5972429bdc146d45fa2d48107559968ad1b7a