Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 10:13
Static task
static1
Behavioral task
behavioral1
Sample
ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
ef9282ff41251164cb2b293d8ebe082f
-
SHA1
01f039edc40c69125d5c04be228eb6f7a23fb931
-
SHA256
561f41e1bb21a3e96a3497b1ac70f8dd0026946d928d7757b659ca8518fe2f48
-
SHA512
988b9f019112ce40c3c6cf7a2528ff094eb4684ced6310232d9b5326bb07e23136447a4107e961b9237bd292d3009857b15132e01256b2e89a661305e45d99d2
-
SSDEEP
24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NaiH/:G9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3516-4-0x00000000027D0000-0x00000000027D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
mspaint.exesethc.exeunregmp2.exepid Process 4964 mspaint.exe 4476 sethc.exe 2580 unregmp2.exe -
Loads dropped DLL 3 IoCs
Processes:
mspaint.exesethc.exeunregmp2.exepid Process 4964 mspaint.exe 4476 sethc.exe 2580 unregmp2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zsovh = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\NjF4\\sethc.exe" -
Processes:
unregmp2.exerundll32.exemspaint.exesethc.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2560 rundll32.exe 2560 rundll32.exe 2560 rundll32.exe 2560 rundll32.exe 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3516 wrote to memory of 2316 3516 89 PID 3516 wrote to memory of 2316 3516 89 PID 3516 wrote to memory of 4964 3516 90 PID 3516 wrote to memory of 4964 3516 90 PID 3516 wrote to memory of 4056 3516 91 PID 3516 wrote to memory of 4056 3516 91 PID 3516 wrote to memory of 4476 3516 92 PID 3516 wrote to memory of 4476 3516 92 PID 3516 wrote to memory of 1328 3516 93 PID 3516 wrote to memory of 1328 3516 93 PID 3516 wrote to memory of 2580 3516 94 PID 3516 wrote to memory of 2580 3516 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵PID:2316
-
C:\Users\Admin\AppData\Local\cgyXrff5u\mspaint.exeC:\Users\Admin\AppData\Local\cgyXrff5u\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4964
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:4056
-
C:\Users\Admin\AppData\Local\Tr7TKw\sethc.exeC:\Users\Admin\AppData\Local\Tr7TKw\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4476
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:1328
-
C:\Users\Admin\AppData\Local\67Mhng\unregmp2.exeC:\Users\Admin\AppData\Local\67Mhng\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54b89f6e04088ebf1e0164fcb8da15fad
SHA1e3e8ddcf00de176119b926baf8857fcd4fcde8be
SHA2562c53697e7e5c3bf09cc6a9c9555da95986eb612802569d93e8865717f02236da
SHA512189949e041f4615d5201295218c77cd8d4afc30b5920d3da1ab44dc1741024232ec512ea870665f741e724fbe00c85a4f8b41b072d156273034c615be84bfa2b
-
Filesize
259KB
MD5a6fc8ce566dec7c5873cb9d02d7b874e
SHA1a30040967f75df85a1e3927bdce159b102011a61
SHA25621f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d
SHA512f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc
-
Filesize
1.4MB
MD5c14a8eac8ff10f60464cd1cab2636110
SHA10995fc80027a55f8dab632386f284663a74b00b6
SHA256219712eced8756450c7bb7f434ef99f48fa32acb98b625cb1f44c044ae3030e6
SHA5129e5b554f7f3ce113486d96683e9f442ba6d25d1514f997b031994cd8023c06c8d4482bff93cc7e3289843082fcec23c4547d4484ae0de50e68dc37ca597d05d3
-
Filesize
104KB
MD58ba3a9702a3f1799431cad6a290223a6
SHA19c7dc9b6830297c8f759d1f46c8b36664e26c031
SHA256615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8
SHA512680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746
-
Filesize
1.4MB
MD5eb19c10eb0fecc111188118f1875a1b1
SHA119d1413be4bb9e7f59b66c830faf4bbaf8a39d55
SHA25624f5ffd73e1c6173a1b713fdceb01dc89e69672707d9a8f262b7e03cbd03ff48
SHA5129bd8633d33623ea688d375cc714913952f26c76d5557812047ecd32ce53b7f6b59b8acb5b1eb366d0d1036f3c6910b57306871d7d127696c1778f855b93a1afd
-
Filesize
965KB
MD5f221a4ccafec690101c59f726c95b646
SHA12098e4b62eaab213cbee73ba40fe4f1b8901a782
SHA25694aa32a2c9c1d2db78318d9c68262c2f834abe26b6e9a661700324b55fdd5709
SHA5128e3f4e4f68565ef09f5e762d6bb41b160711bbacac9dfcbe33edea9885fd042e6ce9a248bfcc62f9cffdb8e6bbe1b04c89bd41fcd9a373a5c8bc7bbff96dceaf
-
Filesize
1KB
MD5eabc59ded29fe9a2f9a8c1724d6b7026
SHA1f6d2ef392cfefc90fb0537eb31358d14b4e41e71
SHA256b276a96844f73a50361d8827da627ec277b77b8d9aff1d55f61ede2bd9868472
SHA51268442af426d206fa4263916828a86f88b22700e6c177839fe80047c18581d211fe96512d1e57ed2513c6daef527c89f2fc31576078a7bebaf29b42f6742007e8