Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
dd004eb1995ca16c41612ab17fb29d16_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
dd004eb1995ca16c41612ab17fb29d16_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
dd004eb1995ca16c41612ab17fb29d16
-
SHA1
3a75a7c007771180bd4c55006b3f60015fa96b8d
-
SHA256
720dda96ea558310e2dd575d2dbd382caeccff1c8a71299b091f293845bf46de
-
SHA512
8ac3e636b114189eab565f7d68f634e989bee34a48b5d259af724c55df9dd4ee70626559d3f73f302de78a605a21e8b0ca88483d8efa1e15cc920c5812e0516a
-
SSDEEP
12288:8VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:JfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3552-4-0x0000000002410000-0x0000000002411000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 4956 SppExtComObj.Exe 924 dxgiadaptercache.exe 5088 CloudNotifications.exe -
Loads dropped DLL 4 IoCs
pid Process 4956 SppExtComObj.Exe 924 dxgiadaptercache.exe 924 dxgiadaptercache.exe 5088 CloudNotifications.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ygssokoticw = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\k6IR\\dxgiadaptercache.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SppExtComObj.Exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dxgiadaptercache.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5056 rundll32.exe 5056 rundll32.exe 5056 rundll32.exe 5056 rundll32.exe 5056 rundll32.exe 5056 rundll32.exe 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found 3552 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3552 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4244 3552 Process not Found 94 PID 3552 wrote to memory of 4244 3552 Process not Found 94 PID 3552 wrote to memory of 4956 3552 Process not Found 95 PID 3552 wrote to memory of 4956 3552 Process not Found 95 PID 3552 wrote to memory of 3276 3552 Process not Found 97 PID 3552 wrote to memory of 3276 3552 Process not Found 97 PID 3552 wrote to memory of 924 3552 Process not Found 98 PID 3552 wrote to memory of 924 3552 Process not Found 98 PID 3552 wrote to memory of 3744 3552 Process not Found 99 PID 3552 wrote to memory of 3744 3552 Process not Found 99 PID 3552 wrote to memory of 5088 3552 Process not Found 100 PID 3552 wrote to memory of 5088 3552 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd004eb1995ca16c41612ab17fb29d16_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
C:\Windows\system32\SppExtComObj.ExeC:\Windows\system32\SppExtComObj.Exe1⤵PID:4244
-
C:\Users\Admin\AppData\Local\NKMD\SppExtComObj.ExeC:\Users\Admin\AppData\Local\NKMD\SppExtComObj.Exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4956
-
C:\Windows\system32\dxgiadaptercache.exeC:\Windows\system32\dxgiadaptercache.exe1⤵PID:3276
-
C:\Users\Admin\AppData\Local\q8tz0z6\dxgiadaptercache.exeC:\Users\Admin\AppData\Local\q8tz0z6\dxgiadaptercache.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:924
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵PID:3744
-
C:\Users\Admin\AppData\Local\QejMvtvk\CloudNotifications.exeC:\Users\Admin\AppData\Local\QejMvtvk\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c096907809920773e6052908f00f7440
SHA175f939fa6eb1847810ce78e651c8273f8cb4fc10
SHA2561201dc4c29c9b626dfc31c2290f059253968af764d550f691dc1129a7f104bd7
SHA512d5652154f6f0c03f5407eafea4e6f60cea619eaaa4452d72f128e0ec89476e28a46dee9a8d13c94f401a92bc40e1b7b823689096076c3708523828f273fcb92b
-
Filesize
559KB
MD5728a78909aa69ca0e976e94482350700
SHA16508dfcbf37df25cae8ae68cf1fcd4b78084abb7
SHA2562a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c
SHA51222bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1
-
Filesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
Filesize
1.2MB
MD53bb143592bb4fbdcbab3d4fea912bb1a
SHA101818aad24a08c6b5a9665444c19b3212e4f7826
SHA256efe3cb1898e36488c837d56cef09b4c71425b2d8003a9528c62262fd72c2362c
SHA51219578553e00cff1365b500293199ae433d381c7b513f401032bd3fdda7b77852073dcd2d5335bf992dd04d0d1e34b012954433715c48c6e5b85922eae5b09877
-
Filesize
1.2MB
MD5ba696031a7e702ff6a9b8beeaa1fcfc3
SHA127b9ca121cc78a201c511487152d42b61c3c02fd
SHA25685c2f517814a79c6b6eaf9644bc95300bb2b10d47b3cf2774b7d25b69f3909a1
SHA51207f0dee5ed1bfa8584dfc608cc6345ff1ccffa0e5f7d6750803c74990ec8c77ebc071b3b180ffa72e6468e61aec9f80569ffd7500797561c5115cac9ee7801fb
-
Filesize
230KB
MD5e62f89130b7253f7780a862ed9aff294
SHA1b031e64a36e93f95f2061be5b0383069efac2070
SHA2564bea9f741fe4ca9d6262477849896b9fa6377326d11af044561c31bde2d994b5
SHA51205649d38a0b5d825bb8442549427b0ff77b139c9dd297b04d6c0fb1415504c95ed750cd79efea2ff514abfc5d1003e6251a3cd871d352dcea06be0cdeb0304f7
-
Filesize
1019B
MD55ecbcaade501110164a67d06ec7468e8
SHA1be0025bff841a2b955bd51e912dae1d7fba7e485
SHA256ae967b35747ba6eca724bb372923ea45bdab11edaf2fb794858ac905f08fec15
SHA5128f096c90ab61983faf9dafd7582961fa418ed42eb2a735ce2d6bf820337d2a54f94779b6ff1844c39916d9b75250d83875265be620f175563352914660e8c3f4