Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
ea01a6add7afdcb129fd6fff4ddb15ce_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
ea01a6add7afdcb129fd6fff4ddb15ce_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
ea01a6add7afdcb129fd6fff4ddb15ce
-
SHA1
11ec5fbc5ad77d25e9d22518f47f8f0b160a46a9
-
SHA256
d9be09a9dd8aaa00eeffcc1023440100139d3176e9ee7600fce67b7d754f204d
-
SHA512
6225b33bd6a0df411679014c25f23d0d41de3c96052f2eae86d1b072831a5e18bbb636775fbf88c2941b16d351aad70ec017545edb58d45122fe0e8cb1fc026d
-
SSDEEP
24576:MuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:k9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3460-4-0x00000000027A0000-0x00000000027A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
cttune.exeDevicePairingWizard.exeSppExtComObj.Exepid Process 3784 cttune.exe 3696 DevicePairingWizard.exe 840 SppExtComObj.Exe -
Loads dropped DLL 3 IoCs
Processes:
cttune.exeDevicePairingWizard.exeSppExtComObj.Exepid Process 3784 cttune.exe 3696 DevicePairingWizard.exe 840 SppExtComObj.Exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ygssokoticw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\uo1\\DevicePairingWizard.exe" -
Processes:
DevicePairingWizard.exeSppExtComObj.Execttune.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SppExtComObj.Exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid Process 2900 regsvr32.exe 2900 regsvr32.exe 2900 regsvr32.exe 2900 regsvr32.exe 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3460 wrote to memory of 3580 3460 89 PID 3460 wrote to memory of 3580 3460 89 PID 3460 wrote to memory of 3784 3460 90 PID 3460 wrote to memory of 3784 3460 90 PID 3460 wrote to memory of 1032 3460 91 PID 3460 wrote to memory of 1032 3460 91 PID 3460 wrote to memory of 3696 3460 92 PID 3460 wrote to memory of 3696 3460 92 PID 3460 wrote to memory of 2196 3460 93 PID 3460 wrote to memory of 2196 3460 93 PID 3460 wrote to memory of 840 3460 94 PID 3460 wrote to memory of 840 3460 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ea01a6add7afdcb129fd6fff4ddb15ce_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵PID:3580
-
C:\Users\Admin\AppData\Local\g7Dq455\cttune.exeC:\Users\Admin\AppData\Local\g7Dq455\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3784
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:1032
-
C:\Users\Admin\AppData\Local\TcBvJ\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\TcBvJ\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3696
-
C:\Windows\system32\SppExtComObj.ExeC:\Windows\system32\SppExtComObj.Exe1⤵PID:2196
-
C:\Users\Admin\AppData\Local\Oye\SppExtComObj.ExeC:\Users\Admin\AppData\Local\Oye\SppExtComObj.Exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56e3dbabbb3a4820328d4e6f52a624cd4
SHA1c23cabf6f0de013a682a46d2b29a6ef786cdc77d
SHA256669fe80231c6efd0c50140394ab24aa2378d5bc26e3371dc2ed0f3cb022d8be7
SHA5128dc4bed2b5ec4d947f36564b3cad37bcf33c612ca8ce90198b6d8d4549021f8afe414fe42b2b69b1595a6ade35c2f29a60d14bd8c473378b60fc6fe4914e7219
-
Filesize
559KB
MD5728a78909aa69ca0e976e94482350700
SHA16508dfcbf37df25cae8ae68cf1fcd4b78084abb7
SHA2562a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c
SHA51222bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1
-
Filesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
Filesize
1.2MB
MD5bd4079c96bb38981885a4c0cbfc8d069
SHA1bef604addca82cdd2143ef0cec987bfd9780296c
SHA2563daa51f0bbf3b6009d897165f7022449fa311106272696b365ef7bb9baea2364
SHA51208226ad0b6e59f334e400a3aaeda7dada6922180a1eaa7ac0871dae3410413650aa88ca69a977a27d71a82b247ea0b4d20ea42a12491b2ad30ad724f6df3838c
-
Filesize
1.2MB
MD55be5758b965e880d5b18e288905d742e
SHA18ecfe7a930b75f88c10985914972b9663bbcedd9
SHA2565d604784d065cad357725f782185a4e29d55f42b1644053dbabc4a6689f4f3a3
SHA512e928c55f8da60b887000f75a1f3f77d1bc633f29a35a4e4749478243e6d923f0a9eb8efee6ea15f9d9c2a9ffdf1d4f5df2d0be48b8b87650c04d962857b8e531
-
Filesize
90KB
MD5fa924465a33833f41c1a39f6221ba460
SHA1801d505d81e49d2b4ffa316245ca69ff58c523c3
SHA256de2d871afe2c071cf305fc488875563b778e7279e57030ba1a1c9f7e360748da
SHA512eef91316e1a679cc2183d4fe9f8f40b5efa6d06f7d1246fd399292e14952053309b6891059da88134a184d9bd0298a45a1bf4bc9f27140b1a31b9523acbf3757
-
Filesize
1KB
MD5025e4091b2c8768dcde56b430cae5391
SHA1edb06e763b4120652126d7f1bbbc853dba802075
SHA256dc05a26a0247380db78b2abea98904dadef847cf24a87d98ea690d5f14cdb8b9
SHA5121e4ea591511f3be7cf3cf8445cd1975b99f0c6a4fd82353bcc371713088833f19069b6db75e8316a1d1fdac7c30527e27154a43afd64121b2e70e290c9e21822