Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
e87adb12a4d0bf15245bbd0d65bb0cfc_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e87adb12a4d0bf15245bbd0d65bb0cfc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e87adb12a4d0bf15245bbd0d65bb0cfc_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
e87adb12a4d0bf15245bbd0d65bb0cfc
-
SHA1
56d12429ec379f1d6df251feb0ee6794ce410bed
-
SHA256
3e42df93d811b179bcebf9e9cfc4402a2b4f7aa92665ee3725850d141c35be09
-
SHA512
2244c10e117dcf2b1592e5e3bb513c3e0976d9765e4c924e82abe72c5948859a2819060d6bbcf6a67217abb7f81b1f1e7b2232e2ea6da6d082d67de61f81dd77
-
SSDEEP
24576:9uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:X9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3492-4-0x00000000014B0000-0x00000000014B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
pid Process 4444 SystemSettingsRemoveDevice.exe 4440 msra.exe 4720 Narrator.exe 3336 unregmp2.exe -
Loads dropped DLL 3 IoCs
pid Process 4444 SystemSettingsRemoveDevice.exe 4440 msra.exe 3336 unregmp2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qgfqnr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\2qWv\\msra.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsRemoveDevice.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 rundll32.exe 1504 rundll32.exe 1504 rundll32.exe 1504 rundll32.exe 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4848 3492 Process not Found 89 PID 3492 wrote to memory of 4848 3492 Process not Found 89 PID 3492 wrote to memory of 4444 3492 Process not Found 90 PID 3492 wrote to memory of 4444 3492 Process not Found 90 PID 3492 wrote to memory of 2312 3492 Process not Found 91 PID 3492 wrote to memory of 2312 3492 Process not Found 91 PID 3492 wrote to memory of 4440 3492 Process not Found 92 PID 3492 wrote to memory of 4440 3492 Process not Found 92 PID 3492 wrote to memory of 1092 3492 Process not Found 93 PID 3492 wrote to memory of 1092 3492 Process not Found 93 PID 3492 wrote to memory of 1628 3492 Process not Found 95 PID 3492 wrote to memory of 1628 3492 Process not Found 95 PID 3492 wrote to memory of 3336 3492 Process not Found 96 PID 3492 wrote to memory of 3336 3492 Process not Found 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e87adb12a4d0bf15245bbd0d65bb0cfc_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
C:\Windows\system32\SystemSettingsRemoveDevice.exeC:\Windows\system32\SystemSettingsRemoveDevice.exe1⤵PID:4848
-
C:\Users\Admin\AppData\Local\16q\SystemSettingsRemoveDevice.exeC:\Users\Admin\AppData\Local\16q\SystemSettingsRemoveDevice.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4444
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:2312
-
C:\Users\Admin\AppData\Local\suA7aMQ\msra.exeC:\Users\Admin\AppData\Local\suA7aMQ\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4440
-
C:\Windows\system32\Narrator.exeC:\Windows\system32\Narrator.exe1⤵PID:1092
-
C:\Users\Admin\AppData\Local\5nT\Narrator.exeC:\Users\Admin\AppData\Local\5nT\Narrator.exe1⤵
- Executes dropped EXE
PID:4720
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:1628
-
C:\Users\Admin\AppData\Local\SLTXmKXa\unregmp2.exeC:\Users\Admin\AppData\Local\SLTXmKXa\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5d552ea2c03c3f92e654fd2f82133d0f8
SHA145d5058b5a0d3ee0c3b1e20c76cef310c59b99f5
SHA25675add49a69280415498997b1ae1241f18f43bcc234f1dcb646b24eaaf00e5f51
SHA5127aef12b21779b36902af42810bdc4b076e9ec150773f678d162bed3b637a306ccacc656148d6e42962f2d4314446b19f01a6fe3f66a53f61390151a1ef1da689
-
Filesize
39KB
MD57853f1c933690bb7c53c67151cbddeb0
SHA1d47a1ad0ccba4c988c8ffc5cbf9636fd4f4fa6e6
SHA2569500731b2a3442f11dfd08a8adfe027e7f32ef5834c628eed4b78be74168470d
SHA512831993d610539d44422d769de6561a4622e1b9cb3d73253774b6cecabf57654a74cd88b4ebe20921585ea96d977225b9501f02a0f6a1fc7d2cad6824fd539304
-
Filesize
521KB
MD5d92defaa4d346278480d2780325d8d18
SHA16494d55b2e5064ffe8add579edfcd13c3e69fffe
SHA25669b8c93d9b262b36e2bdc223cc0d6e312cc471b49d7cc36befbba1f863a05d83
SHA512b82c0fbc07361e4ad6e4ab171e55e1e41e9312ba995dce90696ca90f734f5d1ea11371ca046e8680ea566a1c2e0643ab86f1f6dcf6cbd05aed8448425a2830b5
-
Filesize
1.2MB
MD5cb2e3dbb798c40a000ae94fb5c732ae4
SHA1f4d04f7509cb4d0fd1868cc285292289d89961da
SHA25632c91580f574a8daa5c3a58a755f9d1d343eb230c0df47aac46bbb336df50b5f
SHA51271fcfc6916d0f50cefd3cc1a94ff15d37ff14a0c98730126b028050f64e98f6761e0b4d4d052cfbd04d8e5b08466cf98d709c3634941eaca7eb3cd772999b281
-
Filesize
259KB
MD5a6fc8ce566dec7c5873cb9d02d7b874e
SHA1a30040967f75df85a1e3927bdce159b102011a61
SHA25621f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d
SHA512f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc
-
Filesize
1.2MB
MD58d61203fd62f977a860ee0535f954b3d
SHA14b35545d9b340ffc2cd0229679661c8c48742ad6
SHA256486e41cb2d34ab1f2626415923d301819b40aaf722042ce8269a02deec4c792b
SHA512c2cb0982e222e2d1ba928573bb2ab1b9723377c11c5a09156cd3490363fdb1ce110e41e3e6ec2e3cf22b0866fd524315718598f471fb46d6312c3107327fa64c
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
1KB
MD525c8457ec9a2d3069b721c9378e3408d
SHA1325ead3d7d6bbe9430791eab20b340f93ec56b42
SHA25608dbdb728bd436ee6b27455554acd7e1156642e841cef568bff3e3df78db999d
SHA5120b52f8b3d5e42a55207780077e8a32f191bdca9b1e0dbbe0dcc57a4bdaf93c84ec8ee01ca2ecec3a6c2bdb9bc6fb3e6751c65010470a5e77f6dca082c547a788