Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
f75490824ea7885a46cfa2189a6cf3dc_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
f75490824ea7885a46cfa2189a6cf3dc_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f75490824ea7885a46cfa2189a6cf3dc
-
SHA1
d423fd6f9fa55cfcca264b2d945ed51a3a2c4460
-
SHA256
b8cb3e56aee18f41870fc969d549df5364002f4ce1a6192694d2e2acb9b06754
-
SHA512
e6329b4ec086e3a19d144ac70a499b23409e2ebee762e66dc65104cdad9057ca420360c26e4340b9c22bcc396e0255e593cf6a01787a3fd3ca811eedfeb4e3e8
-
SSDEEP
24576:HVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:HV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3388-4-0x0000000002C50000-0x0000000002C51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2908 msra.exe 4720 mblctr.exe 4904 unregmp2.exe -
Loads dropped DLL 3 IoCs
pid Process 2908 msra.exe 4720 mblctr.exe 4904 unregmp2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isybexcquevfui = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\kvVOg0p5\\mblctr.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 220 rundll32.exe 220 rundll32.exe 220 rundll32.exe 220 rundll32.exe 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found 3388 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3388 wrote to memory of 3624 3388 Process not Found 89 PID 3388 wrote to memory of 3624 3388 Process not Found 89 PID 3388 wrote to memory of 2908 3388 Process not Found 90 PID 3388 wrote to memory of 2908 3388 Process not Found 90 PID 3388 wrote to memory of 3236 3388 Process not Found 91 PID 3388 wrote to memory of 3236 3388 Process not Found 91 PID 3388 wrote to memory of 4720 3388 Process not Found 92 PID 3388 wrote to memory of 4720 3388 Process not Found 92 PID 3388 wrote to memory of 3616 3388 Process not Found 93 PID 3388 wrote to memory of 3616 3388 Process not Found 93 PID 3388 wrote to memory of 4904 3388 Process not Found 94 PID 3388 wrote to memory of 4904 3388 Process not Found 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f75490824ea7885a46cfa2189a6cf3dc_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:220
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:3624
-
C:\Users\Admin\AppData\Local\jg1A76y7e\msra.exeC:\Users\Admin\AppData\Local\jg1A76y7e\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2908
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:3236
-
C:\Users\Admin\AppData\Local\OA0\mblctr.exeC:\Users\Admin\AppData\Local\OA0\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4720
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:3616
-
C:\Users\Admin\AppData\Local\BV6aqmDX\unregmp2.exeC:\Users\Admin\AppData\Local\BV6aqmDX\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5baae7917baa177189049966e9a52e71c
SHA1671081e02b340b3057d7f6d5769041c04a83b6eb
SHA2561d6e6aac9eb85e521afc702e9e41e332b5ff088977df09041a537e6b55a55b00
SHA512f1cb16acaccd1b4694383d65089eab98da8e3749d8cba4255abc7e0fd28e04ce849c628b9a330d058749dfe52edb6883af5067bbaab158b2bab23dae20ad470a
-
Filesize
259KB
MD5a6fc8ce566dec7c5873cb9d02d7b874e
SHA1a30040967f75df85a1e3927bdce159b102011a61
SHA25621f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d
SHA512f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc
-
Filesize
1.2MB
MD5a9fca37be4ceeaac5b44f24708891f53
SHA1e908cdb5e572f9b2a9fcad0ebf3ad041d18a6023
SHA2563925cbafd431d076c88f7df60d37921e59d0de5eeffb48bc55304a5fde067cae
SHA5127d75ed93b21552c335e9456ef54a4bac3d2c0c901b3f4c310133d0e5f67de858ebe8c15e27593ce00220ac334aa2254d1166e3e5a7cddd6015a51e4cb6ed543f
-
Filesize
790KB
MD5d3db14eabb2679e08020bcd0c96fa9f6
SHA1578dca7aad29409634064579d269e61e1f07d9dd
SHA2563baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69
SHA51214dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe
-
Filesize
1.2MB
MD5b0b0375e3e2b996818cb06c8679bdda3
SHA17e9fafd2a9725ee96fcdd49ee1d15c97b976c74e
SHA25645074673e2656025dc8077b3fa500ebe75442a41d4835a9ba7b110ba5ab4db33
SHA5124200039703175c12f0d116518f045675923fee10e9f17ee197f587728272f3ed1b1710408f75eae41a751c2e9e20b6c42778256563f7b7431249e4be0052e497
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
1KB
MD520b334707f8b30ac0adcc21b355e4ccd
SHA16066096040ea664678312181a4a62627658797e1
SHA2562d77a9c1857e6afd38f718125792cdc8d789b6881573618ccfffe70f991a947f
SHA51277df6e059124a5b8d69eaf946ffbd9c396358f2398501aa1f9d69937fdfdd8860eef78f142b7ad3e7ba99ef572aa1a684ec83c995428e49a54be1bfc700863f2