Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
e2653dc54e2257c34dd7d16ae5f9d1b1_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
e2653dc54e2257c34dd7d16ae5f9d1b1_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
e2653dc54e2257c34dd7d16ae5f9d1b1
-
SHA1
3de7fed00d1161d0e06c802a790932e9c5aa7cb8
-
SHA256
86f7814d9e9ee52f35aa907f6a1a8da5afbedc5190cfbdc358c090c59a0bc7e5
-
SHA512
812df21cd838255f041e17610c1b37069184fc0b217b8bd2cf7c6dded45ea41a2bdb9c4cdc507fba111905dc7563810663759fdcdd3b41d8257475c7d5b0d96f
-
SSDEEP
24576:FuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:/9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3436-4-0x0000000007A50000-0x0000000007A51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 3112 ie4uinit.exe 4992 SndVol.exe 2892 tabcal.exe -
Loads dropped DLL 4 IoCs
pid Process 3112 ie4uinit.exe 3112 ie4uinit.exe 4992 SndVol.exe 2892 tabcal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Veuhujsfce = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\AutomaticDestinations\\kWwYsVHO5\\SndVol.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4uinit.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3436 Process not Found 3436 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3436 wrote to memory of 3084 3436 Process not Found 94 PID 3436 wrote to memory of 3084 3436 Process not Found 94 PID 3436 wrote to memory of 3112 3436 Process not Found 95 PID 3436 wrote to memory of 3112 3436 Process not Found 95 PID 3436 wrote to memory of 4060 3436 Process not Found 96 PID 3436 wrote to memory of 4060 3436 Process not Found 96 PID 3436 wrote to memory of 4992 3436 Process not Found 97 PID 3436 wrote to memory of 4992 3436 Process not Found 97 PID 3436 wrote to memory of 3952 3436 Process not Found 98 PID 3436 wrote to memory of 3952 3436 Process not Found 98 PID 3436 wrote to memory of 2892 3436 Process not Found 99 PID 3436 wrote to memory of 2892 3436 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e2653dc54e2257c34dd7d16ae5f9d1b1_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵PID:3084
-
C:\Users\Admin\AppData\Local\aypNg\ie4uinit.exeC:\Users\Admin\AppData\Local\aypNg\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3112
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:4060
-
C:\Users\Admin\AppData\Local\tbuIX\SndVol.exeC:\Users\Admin\AppData\Local\tbuIX\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4992
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:3952
-
C:\Users\Admin\AppData\Local\fBH\tabcal.exeC:\Users\Admin\AppData\Local\fBH\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD538f31fdbef4ed41ff8d2bbe7e4916fc5
SHA12b1c092783d661ecc8f01132a98e5ba23541b7b8
SHA2563291e295e4862a4784883c91556610f32c54435813e0269b7db602aa26b1d974
SHA5127cedb31b92000e85f42d06609e355db564c65f269fbab2a2fe4b453b90433eab4fd6d85bad8ec5d7280cc0eea3a8a115bad58ac8df985e49ca037ab87633fbeb
-
Filesize
262KB
MD5a2f0104edd80ca2c24c24356d5eacc4f
SHA18269b9fd9231f04ed47419bd565c69dc677fab56
SHA2565d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c
SHA512e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390
-
Filesize
1.2MB
MD54fcc5f8ec2d138ca656c6cec5f0b44dc
SHA1b1734dce62eb8ac7b14fc3e852424e48a832cbb8
SHA256b6b391bd25eb1db16387cae97e96fb71803b79e0f8346d7cc1d5df3fab775e51
SHA5120df7213ba6a9b85d59c062dd5cdd03385ab0d6f9ca7b4ceb14ee159d5133cd0a7ed8ca927613631c011d7109ad0610eeefeb51cee35c88c6f544295959348fea
-
Filesize
84KB
MD540f4014416ff0cbf92a9509f67a69754
SHA11798ff7324724a32c810e2075b11c09b41e4fede
SHA256f31b4c751dbca276446119ba775787c3eb032da72eabcd40ad96a55826a3f33c
SHA512646dfe4cfe90d068c3da4c35f7053bb0f57687875a0f3469c0683e707306e6a42b0baca3e944d78f9be5c564bb0600202c32c223a770f89d3e2b07a24673c259
-
Filesize
269KB
MD5c5d939ac3f9d885c8355884199e36433
SHA1b8f277549c23953e8683746e225e7af1c193ad70
SHA25668b6ced01f5dfc2bc9556b005f4fff235a3d02449ad9f9e4de627c0e1424d605
SHA5128488e7928e53085c00df096af2315490cd4b22ce2ce196b157dc0fbb820c5399a9dbd5dead40b24b99a4a32b6de66b4edc28339d7bacd9c1e7d5936604d1a4f0
-
Filesize
1.2MB
MD59f9b467d0751dc545aa460ba155ae735
SHA1f2a47033a38364b18062ea2cecb505ca6405baa4
SHA25696addda9befe227aa0b229057b1e476a314dd99976e50dd419ab3293d703f52d
SHA512869ffb2923692c4aef1ad4784d77eb627e3b70c37cdab54ba89dabf48c8de764d18fca91e0fe99809a4973f03a4b3629be3ba458f1b0be607938a6b3da4457a0
-
Filesize
1KB
MD512612384852df9e3ce38c6ab781f2143
SHA1a6bc6ec2ea413d80d5f58b42a33774f6d378fe00
SHA256c5318543581680247b41680529ad968c0e80f6c749dff2e98a78018733a58ac4
SHA5122b0481b9b970c4924655ca7cb1d35eb757e9892adc601ce7422c76fff86db857bce201f8a9beb7606d7b99567d52528884a290112bed2e6993e6ec97b3df3dc0