Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
e090a110c92fd8946f94056dba3191a0_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
e090a110c92fd8946f94056dba3191a0_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
e090a110c92fd8946f94056dba3191a0
-
SHA1
e4d9a011c12ba06f3afbdad94c6d65459f98d479
-
SHA256
9b35e8390d3620e3c5a99040ea4c5ad6e3ec02a165b5cf788ceec7f31a68a4a0
-
SHA512
15c822a0530564d4c16d11428d5f3afe260881b4e7db6225b650b71ed20f20629c13e4edf7fd5cf806951b7c7a9a7afee680fbdcda3b5e477b8f078ff7b1308b
-
SSDEEP
24576:CuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:K9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3464-4-0x0000000006C60000-0x0000000006C61000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
MusNotificationUx.exeRecoveryDrive.exeDevicePairingWizard.exepid process 2148 MusNotificationUx.exe 1688 RecoveryDrive.exe 4552 DevicePairingWizard.exe -
Loads dropped DLL 3 IoCs
Processes:
MusNotificationUx.exeRecoveryDrive.exeDevicePairingWizard.exepid process 2148 MusNotificationUx.exe 1688 RecoveryDrive.exe 4552 DevicePairingWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ygssokoticw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\rXA\\RecoveryDrive.exe" -
Processes:
DevicePairingWizard.exerundll32.exeMusNotificationUx.exeRecoveryDrive.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MusNotificationUx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RecoveryDrive.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 220 rundll32.exe 220 rundll32.exe 220 rundll32.exe 220 rundll32.exe 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3464 3464 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3464 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3464 wrote to memory of 4768 3464 MusNotificationUx.exe PID 3464 wrote to memory of 4768 3464 MusNotificationUx.exe PID 3464 wrote to memory of 2148 3464 MusNotificationUx.exe PID 3464 wrote to memory of 2148 3464 MusNotificationUx.exe PID 3464 wrote to memory of 684 3464 RecoveryDrive.exe PID 3464 wrote to memory of 684 3464 RecoveryDrive.exe PID 3464 wrote to memory of 1688 3464 RecoveryDrive.exe PID 3464 wrote to memory of 1688 3464 RecoveryDrive.exe PID 3464 wrote to memory of 5048 3464 DevicePairingWizard.exe PID 3464 wrote to memory of 5048 3464 DevicePairingWizard.exe PID 3464 wrote to memory of 4552 3464 DevicePairingWizard.exe PID 3464 wrote to memory of 4552 3464 DevicePairingWizard.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e090a110c92fd8946f94056dba3191a0_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:220
-
C:\Windows\system32\MusNotificationUx.exeC:\Windows\system32\MusNotificationUx.exe1⤵PID:4768
-
C:\Users\Admin\AppData\Local\0QBKbgfiv\MusNotificationUx.exeC:\Users\Admin\AppData\Local\0QBKbgfiv\MusNotificationUx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2148
-
C:\Windows\system32\RecoveryDrive.exeC:\Windows\system32\RecoveryDrive.exe1⤵PID:684
-
C:\Users\Admin\AppData\Local\6so\RecoveryDrive.exeC:\Users\Admin\AppData\Local\6so\RecoveryDrive.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1688
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:5048
-
C:\Users\Admin\AppData\Local\g0qdic\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\g0qdic\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD5869a214114a81712199f3de5d69d9aad
SHA1be973e4188eff0d53fdf0e9360106e8ad946d89f
SHA256405c2df9a36d7cfb5c8382c96f04792eb88c11a6cfa36b1d2ec3e0bec8d17361
SHA512befcdeb8de6e68b9ee0bacd4cbc80f7393a0213d4039b239c98585e0cd5db1755c75559a62372374cbfb7132b6a7973ea9e6a31952e0e0ba007079c56e6d9012
-
Filesize
1.4MB
MD5032c4e6e643e0200a8b910d90ad03454
SHA1d0a3bdf5e47a5fafa63a08507ba46dcbd219bb46
SHA25664cc8c59d9957560d5d3615561f10bc9d9885b2a130338e00b8bde91967162d1
SHA51212d73378880fb7e8165965cc892bac01273c8da29a30e885439d86dd4a8c436ddca43dd05f6d2e2c81a2327facbf92585b9dccd8e8a83f7119d098d24678b343
-
Filesize
1.4MB
MD50cc2873c2d076ee18c3925fd7fec0186
SHA16afdb70d8f35dad259a86271eec2b3f52305fe21
SHA2564fdafb78a8c2def866e2b80f48515f76afb7a396b55bcc4e1faa179e5122ae7d
SHA512f377291dbd14bb1a06b7e326c2a013ad4bcffd0a3fcb0c8f4efecc271919936a1ce2e2eb87c8db9bf2f891d14926db62fd7d5e9288c4066349eef1c8878b9a01
-
Filesize
911KB
MD5b9b3dc6f2eb89e41ff27400952602c74
SHA124ae07e0db3ace0809d08bbd039db3a9d533e81b
SHA256630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4
SHA5127906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe
-
Filesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
Filesize
1.4MB
MD5ef98cb5c2a81cf425e648672498fd736
SHA16a09457c1c08519786babc94a716820920203124
SHA2562991a3625093aac85c795eb31a66edfabfd3d18d75f0ba0f10ad8e5afda37be3
SHA512f9e1763a7d9da96e14a8680b6d3fcca92075b269b04758215066d6d913663ba52f49c1323779c360442f86ebd6fbc6ea386705ee978b47f1eb60992be2625375
-
Filesize
1KB
MD5860d6f6e5de8b6484d6517c73ede3892
SHA11ebdd77d25926790b8c7fb1d06b45b583b23d4e2
SHA256558ee04fb9ebd12b46df2a9429328d6daa6a500f239faf9180c3df6d40e4fd50
SHA51252aef3187d110e16660246d9538e1027b5f3fd1a29caa9663de76f6e9c1dd3e7803549fe9d7decd019a1d84d5a21d07e2096f49830512821c9f803b8a1b050ec