Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
ef144112ab3bd4e5fede0a35175b0865_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
ef144112ab3bd4e5fede0a35175b0865_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
ef144112ab3bd4e5fede0a35175b0865
-
SHA1
ea9e920ef55c48d710b9dbd593ba87e1da2f1b35
-
SHA256
a63b33397161f4ae306b3304283359d24e52c75aef053ef690794cc664069c91
-
SHA512
15f45026594769fddeed6ff1f60f15b27cab2492bd12d4d5d910abdab1802e281540823bcde73c0eab38ecd5ab8bc38054b3d7da6db3bb71a4c1b8fd0d236ee1
-
SSDEEP
24576:2uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:29cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3492-4-0x0000000002680000-0x0000000002681000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 4044 phoneactivate.exe 3592 CloudNotifications.exe 4224 GamePanel.exe -
Loads dropped DLL 3 IoCs
pid Process 4044 phoneactivate.exe 3592 CloudNotifications.exe 4224 GamePanel.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wdtbxtklooytt = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\B4DZpgO0bHn\\CloudNotifications.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3076 rundll32.exe 3076 rundll32.exe 3076 rundll32.exe 3076 rundll32.exe 3076 rundll32.exe 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found 3492 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4932 3492 Process not Found 89 PID 3492 wrote to memory of 4932 3492 Process not Found 89 PID 3492 wrote to memory of 4044 3492 Process not Found 90 PID 3492 wrote to memory of 4044 3492 Process not Found 90 PID 3492 wrote to memory of 640 3492 Process not Found 91 PID 3492 wrote to memory of 640 3492 Process not Found 91 PID 3492 wrote to memory of 3592 3492 Process not Found 92 PID 3492 wrote to memory of 3592 3492 Process not Found 92 PID 3492 wrote to memory of 3588 3492 Process not Found 93 PID 3492 wrote to memory of 3588 3492 Process not Found 93 PID 3492 wrote to memory of 4224 3492 Process not Found 94 PID 3492 wrote to memory of 4224 3492 Process not Found 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef144112ab3bd4e5fede0a35175b0865_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵PID:4932
-
C:\Users\Admin\AppData\Local\RxVzNFAA\phoneactivate.exeC:\Users\Admin\AppData\Local\RxVzNFAA\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4044
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵PID:640
-
C:\Users\Admin\AppData\Local\KePJfbO\CloudNotifications.exeC:\Users\Admin\AppData\Local\KePJfbO\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3592
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵PID:3588
-
C:\Users\Admin\AppData\Local\qo8W2xt\GamePanel.exeC:\Users\Admin\AppData\Local\qo8W2xt\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
Filesize
1.2MB
MD5a1199c44fe8ed293e8df3b6e8489b5ef
SHA1e31902eb09a4e86cc03de9d4a561ba4e8c86d6b6
SHA25600b93726825825ecdaaedecb54864ee661f8e6f6bfb9e705d1cf899144d2188b
SHA512bc35bf4351335db10397cc0d6a99ed91f22e295ba66784562230d736b4bdec15ba8556df541e4211f07d77cc7c23b1d5453b704b80d606d74ea8971a415396c7
-
Filesize
1.4MB
MD5c3a13ccf780ff2155533488516d07e0e
SHA1e2acaa2c8d0819bd19b93c0bcb7f4456d62912ed
SHA25605365007e2674ce40ab3b06015218cc59c64db1b0bfd361c7de0230d10166fc3
SHA5122879625f2f70aba0bc4e766a778e356157b13755a5a6f93744b50a079fc74d2eb5d906a3d1bd4398712e47ed7a1cd5b309391fbfcede05a08e74e46218516b60
-
Filesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
Filesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
Filesize
1.2MB
MD52c9acb2da2da95787c717a06b31974f6
SHA15e193eaaebeb2107e6c0f7a2f2ea1b7fbb3bba09
SHA256ee49b84b5908a4b3784a67a4929f713b2e3d2fe6064f76f6a7dd902471e12b1b
SHA5128d8752d500bcb12459c8cbd64d9300b18a016ae9fccb65042ab6bb75f20aa02a03131bf3b52b95d82b9c955fc3e89d56717ac7f9391156adad0294d7078ec955
-
Filesize
1KB
MD52dd0c31bc5ea23bcd933166e8293b432
SHA1580d8d35aafdbcae32036ddd63a13fb2e2d8d44c
SHA2561b7107dae30d05b3af09e9c3191d6d56ca0e5bf4c225a61f84adbec0ea6f0bc9
SHA512506407358c9918fd37ee93350564c782c1491301fd00102f84334d3b192307b75ae0d7d4add489d4f87e197aa102d3d417697a5d3eb653f9b736cb6450c7bade