Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
e11bf282fd9be970031baf9797a1379a_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
e11bf282fd9be970031baf9797a1379a_JaffaCakes118.dll
-
Size
991KB
-
MD5
e11bf282fd9be970031baf9797a1379a
-
SHA1
1f7d6162e6ded5db6199dfb1274c2849a0a48657
-
SHA256
32e5d40ccc266ccfb480fce21f10220a42dcf29b437685b9355b013aa4df6e05
-
SHA512
886a68d0ad35357c25dd0511d8a9b84eb06a46a499b7e6c28ab4a5300f0c31ae4a598456b6e49648db1b01beaaf76730536336a35f675d134af71ed1723e263b
-
SSDEEP
24576:hVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:hV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3404-4-0x0000000007D40000-0x0000000007D41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1896 PresentationSettings.exe 5028 CloudNotifications.exe 536 SystemPropertiesPerformance.exe -
Loads dropped DLL 3 IoCs
pid Process 1896 PresentationSettings.exe 5028 CloudNotifications.exe 536 SystemPropertiesPerformance.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wdtbxtklooytt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\KB51JL~1\\CLOUDN~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4328 rundll32.exe 4328 rundll32.exe 4328 rundll32.exe 4328 rundll32.exe 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3404 Process not Found Token: SeCreatePagefilePrivilege 3404 Process not Found Token: SeShutdownPrivilege 3404 Process not Found Token: SeCreatePagefilePrivilege 3404 Process not Found Token: SeShutdownPrivilege 3404 Process not Found Token: SeCreatePagefilePrivilege 3404 Process not Found Token: SeShutdownPrivilege 3404 Process not Found Token: SeCreatePagefilePrivilege 3404 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3404 Process not Found 3404 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3404 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3404 wrote to memory of 3628 3404 Process not Found 94 PID 3404 wrote to memory of 3628 3404 Process not Found 94 PID 3404 wrote to memory of 1896 3404 Process not Found 95 PID 3404 wrote to memory of 1896 3404 Process not Found 95 PID 3404 wrote to memory of 3120 3404 Process not Found 96 PID 3404 wrote to memory of 3120 3404 Process not Found 96 PID 3404 wrote to memory of 5028 3404 Process not Found 97 PID 3404 wrote to memory of 5028 3404 Process not Found 97 PID 3404 wrote to memory of 1740 3404 Process not Found 98 PID 3404 wrote to memory of 1740 3404 Process not Found 98 PID 3404 wrote to memory of 536 3404 Process not Found 99 PID 3404 wrote to memory of 536 3404 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e11bf282fd9be970031baf9797a1379a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵PID:3628
-
C:\Users\Admin\AppData\Local\mGloKwob\PresentationSettings.exeC:\Users\Admin\AppData\Local\mGloKwob\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1896
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵PID:3120
-
C:\Users\Admin\AppData\Local\qxoc\CloudNotifications.exeC:\Users\Admin\AppData\Local\qxoc\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5028
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:1740
-
C:\Users\Admin\AppData\Local\IJrG4F1W\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\IJrG4F1W\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
991KB
MD517ae2f6b0ec1f088655a87204eaf56e3
SHA180fb51a92636cf82b2395f11f8a716c820eb65f7
SHA2567b6ebd8675fdc9b158d2758a67f4ac748b40f13e4a013b3c3c80777160b90dc3
SHA5121bf6a0b174342021e88a8908e6ed16f9d719b0e87fc5311435c4ddb0ce48b351ef7ef3eab25076ac25317601c049a8ec386147d1524630f5699b0fa8ed142b7e
-
Filesize
82KB
MD5e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1adbfa782b7998720fa85678cc85863b961975e28
SHA256b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
SHA512c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6
-
Filesize
219KB
MD5790799a168c41689849310f6c15f98fa
SHA1a5d213fc1c71a56de9441b2e35411d83770c01ec
SHA2566e59ab1a0b4ac177dc3397a54afcf68fcea3c1ee72c33bd08c89f04a6dac64b8
SHA5128153b79d4681f21ade7afe995841c386bff8e491ad347f8e7c287df5f9053cae7458e273339146d9a920ceaa2ba0f41cc793d7b2c0fa80efbb41477d39470866
-
Filesize
996KB
MD5a2aa1d5e23808d93c4c28307816363ea
SHA1e2ecc5b0afb671c06e066f4f379fcb9a2a2025d0
SHA25601c35f6521d953af88f1742044b2eff0110df62cac6ed47aa4aec184e9774817
SHA512006b093cc6148455c06398754746a7fd8a461cf63c01804afb1c1a487e8fcd0da29ebc712af96c1864d8e89484696ecd78e0696c7d576ea860908ea27d3f8133
-
Filesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
Filesize
994KB
MD52954c93bef56704436d5e2be7d6a6489
SHA16dba178c3ba95727b2de6a39f815b9f851b6cfee
SHA2566e87c0a2fa88bd7c1dac3890aca9fb91021d83318f6a37ef5c64404df536ac2b
SHA512567445a78203ca8da3bc33a993e0fde80c22c537ad28a66775b49bfca237674229928dde224be629819ae6e743211c877bab3836bc672ff0649a6f05c141e1f5
-
Filesize
1KB
MD547754e8d7b3618548d1713f2b76cd653
SHA1f376b4cd20e59cabbbc8b490248db8f0ee3cac87
SHA2565205705bc5afe50eb4b4c33ba646dea0478007d56001c62ce50b89daed0a9f16
SHA5120501dd24530f51649f122aca379fed86257ce139950c36ff503b83cb77273c1ccfd97d1dcec3e4d37bca87d6723da0305c0e3d54ad1a47b5eef120edc5c55976