Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
f7be1eab255e2a375ea6beedd7d8a764_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
f7be1eab255e2a375ea6beedd7d8a764_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f7be1eab255e2a375ea6beedd7d8a764
-
SHA1
64eb172fc246f70cf745e0a25fd74276fa7faf33
-
SHA256
997d7cb2cc9b826d90e614f7f65398727a87682c4bdcde9dc34538db1bfdb334
-
SHA512
2ca17e868ab645f3619fe9a74165989f513e403a38d84e430caf43ef432595699d74149a010f7d6b5b17f6f275c7c26dd8743c92ba670859d5bd02e4c73ef3a8
-
SSDEEP
24576:LuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:V9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3472-4-0x0000000003300000-0x0000000003301000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdpclip.exePresentationHost.exeie4ushowIE.exepid Process 1400 rdpclip.exe 5064 PresentationHost.exe 3988 ie4ushowIE.exe -
Loads dropped DLL 3 IoCs
Processes:
rdpclip.exePresentationHost.exeie4ushowIE.exepid Process 1400 rdpclip.exe 5064 PresentationHost.exe 3988 ie4ushowIE.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ygssokoticw = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\HaFVy9wg9\\PresentationHost.exe" -
Processes:
rundll32.exerdpclip.exePresentationHost.exeie4ushowIE.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4ushowIE.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 3868 rundll32.exe 3868 rundll32.exe 3868 rundll32.exe 3868 rundll32.exe 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 3472 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3472 wrote to memory of 3740 3472 87 PID 3472 wrote to memory of 3740 3472 87 PID 3472 wrote to memory of 1400 3472 88 PID 3472 wrote to memory of 1400 3472 88 PID 3472 wrote to memory of 1892 3472 91 PID 3472 wrote to memory of 1892 3472 91 PID 3472 wrote to memory of 5064 3472 92 PID 3472 wrote to memory of 5064 3472 92 PID 3472 wrote to memory of 936 3472 93 PID 3472 wrote to memory of 936 3472 93 PID 3472 wrote to memory of 3988 3472 94 PID 3472 wrote to memory of 3988 3472 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7be1eab255e2a375ea6beedd7d8a764_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:3740
-
C:\Users\Admin\AppData\Local\Y204n\rdpclip.exeC:\Users\Admin\AppData\Local\Y204n\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1400
-
C:\Windows\system32\PresentationHost.exeC:\Windows\system32\PresentationHost.exe1⤵PID:1892
-
C:\Users\Admin\AppData\Local\9QIw4o\PresentationHost.exeC:\Users\Admin\AppData\Local\9QIw4o\PresentationHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5064
-
C:\Windows\system32\ie4ushowIE.exeC:\Windows\system32\ie4ushowIE.exe1⤵PID:936
-
C:\Users\Admin\AppData\Local\SlzQ51CT\ie4ushowIE.exeC:\Users\Admin\AppData\Local\SlzQ51CT\ie4ushowIE.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5ef27d65b92d89e8175e6751a57ed9d93
SHA17279b58e711b459434f047e9098f9131391c3778
SHA25617d6dcfaced6873a4ac0361ff14f48313f270ac9c465e9f02b5c12b5a5274c48
SHA51240f46c3a131bb0388b8a3f7aee422936f6e2aa8d2cda547c43c4e7979c163d06c5aa20033a5156d3eeee5d455eeb929cbce89bcc8bb1766cbb65d7f03dd23e2e
-
Filesize
1.2MB
MD5b18b33770cf996999a556659b93a92ca
SHA12fcf1dc9558895545853397c66a0c09c857cd57b
SHA256fb4462394f795c8c963ce4f80ce5b48054191e2454f026f2f82c4959a66c9ffa
SHA51234cc5a5e6c29ea6b495ae4a5405e6a4b44a5d184581024f795941a3a17ef0250f660d565f38154b812bd55b0bae82c90b51a3568a9eb7e0588ea91011d1803a5
-
Filesize
1.2MB
MD52700dc6a9e7c77c5869aeeec62dcc213
SHA176b1458edfb81ebded3d1ed1dd3e2de0dd8a323a
SHA2561473896b84e836d60517fa078622c325c230680b61c7a54fa2fa678d4555f6df
SHA512efbc52be8c63e750dfd1f860b58315403f55efa0a1efd9b62e470ecd64bffe8186c4ebed130a68be9d126e7a9ea3c2ae43116b4a9a84ed476e6e282fe26f08c2
-
Filesize
76KB
MD59de952f476abab0cd62bfd81e20a3deb
SHA1109cc4467b78dad4b12a3225020ea590bccee3e6
SHA256e9cb6336359ac6f71ac75af2836efb28daa3bafd10a1f0b775dcdc2ec8850a6b
SHA5123cbe50a146ca50b0657a78a2d89a34630c69823005668906785b2d2015cc6139c8dbbf7aefa5fe55957ef55ae06e758933b3b41eaf822e49dba3b7700582e2c9
-
Filesize
1.2MB
MD50e44137396217bb930a5c72f9d8ce350
SHA1aa9a24d8f7a6533d574d318180a124e777ae98d5
SHA256ad172b3c7ed150f898a61a5e471436aeb1d709f378cfbfa2dcbf7e9a1e639b13
SHA512540a43f4b70ea496d8e36bf764ec9a6594ee4ae0c5aa8068f5a3bb1528a6e4dade3b049a0de5ca94f3b3d28dc2e0b2e97bd32aa97a5d5f4c0381dd9cd9dd4c97
-
Filesize
446KB
MD5a52402d6bd4e20a519a2eeec53332752
SHA1129f2b6409395ef877b9ca39dd819a2703946a73
SHA2569d5be181d9309dea98039d2ce619afe745fc8a9a1b1c05cf860b3620b5203308
SHA512632dda67066cff2b940f27e3f409e164684994a02bda57d74e958c462b9a0963e922be4a487c06126cecc9ef34d34913ef8315524bf8422f83c0c135b8af924e
-
Filesize
1KB
MD505e3aaab817eb06bb68e28caac03e0eb
SHA1001e8d61ada797e9223f64a1f13aa448ff3550e6
SHA256521262bda6a660d4c449f6cce75764bc20b3882695fff3702bb95e05ec01931f
SHA512c6a62c4862625cca55bf8836e37b7e2a4d586aa89c13bda13d11c8136d07c87d8db2d97f0888525404360e2ea337de999679d8f18f2b209939be7115ea7a2990