Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
f85ef19bb03d5ca288b7b6aa1077168c_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
f85ef19bb03d5ca288b7b6aa1077168c_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f85ef19bb03d5ca288b7b6aa1077168c
-
SHA1
abfb99abb75dbdaa00e7b3827c22817180c3a016
-
SHA256
3a5d69c3a2b52ad6d2eb5c1471ca4e93fbb17cae1bc33972a67c2aedda09581f
-
SHA512
0a4d9fdc3ab4694f6ce9ef3dc5251d1f048a60bdf73ccde4e6e00c6074fa4ba69ead7aaa0c63ebdc83ce00a453c935c8a4b4f1953f709dfcd8d57be10e42e485
-
SSDEEP
24576:QuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:A9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3476-4-0x0000000002D80000-0x0000000002D81000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 976 CloudNotifications.exe 5084 unregmp2.exe 3020 rdpinput.exe -
Loads dropped DLL 3 IoCs
pid Process 976 CloudNotifications.exe 5084 unregmp2.exe 3020 rdpinput.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isybexcquevfui = "C:\\Users\\Admin\\AppData\\Roaming\\Sun\\Java\\Deployment\\CeBiAHVFWD\\unregmp2.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4112 rundll32.exe 4112 rundll32.exe 4112 rundll32.exe 4112 rundll32.exe 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3476 wrote to memory of 4740 3476 Process not Found 89 PID 3476 wrote to memory of 4740 3476 Process not Found 89 PID 3476 wrote to memory of 976 3476 Process not Found 90 PID 3476 wrote to memory of 976 3476 Process not Found 90 PID 3476 wrote to memory of 2976 3476 Process not Found 91 PID 3476 wrote to memory of 2976 3476 Process not Found 91 PID 3476 wrote to memory of 5084 3476 Process not Found 92 PID 3476 wrote to memory of 5084 3476 Process not Found 92 PID 3476 wrote to memory of 808 3476 Process not Found 93 PID 3476 wrote to memory of 808 3476 Process not Found 93 PID 3476 wrote to memory of 3020 3476 Process not Found 94 PID 3476 wrote to memory of 3020 3476 Process not Found 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f85ef19bb03d5ca288b7b6aa1077168c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵PID:4740
-
C:\Users\Admin\AppData\Local\c2FJj\CloudNotifications.exeC:\Users\Admin\AppData\Local\c2FJj\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:976
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:2976
-
C:\Users\Admin\AppData\Local\0wfN6\unregmp2.exeC:\Users\Admin\AppData\Local\0wfN6\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5084
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵PID:808
-
C:\Users\Admin\AppData\Local\mue945JOV\rdpinput.exeC:\Users\Admin\AppData\Local\mue945JOV\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5047e3208a8dba203cdab274bcb0169b8
SHA154dbf045eca173f10bd997499b6a03340570b1f7
SHA256af33de1b1e10a08951590d526df4f812bfcce7ce9a5b326ea2fa059f14dd2253
SHA51216ed44456c576d633cf5c4554a9c86089b63ceeff4bb29f27c8bda8d501079a979281c8b771c87a5da712e889c29c2d93cb309b2d49fcfa7673a6c975739fbae
-
Filesize
259KB
MD5a6fc8ce566dec7c5873cb9d02d7b874e
SHA1a30040967f75df85a1e3927bdce159b102011a61
SHA25621f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d
SHA512f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc
-
Filesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
Filesize
1.2MB
MD5d1659179a796b03dd04a85181b0590e2
SHA1b9323b15aa2392d9037733e298bf5f238db3a038
SHA256b2d15a0efa1abc63578486df4b46a3c86d69f8970f70ab0f4028bd74be1f260a
SHA512441010bb0ebbf78d7a85ca111ef827d00480479c32426f2acd33ea1a4b6308e4121e1b31f43ef8d94cb44d27fa714771a4fd7c278cb99e25a6c6df5d65a4c397
-
Filesize
1.2MB
MD5ec343b2a92a8a82b3285659a684c6c7e
SHA1c81f072b5e4535cad293c782627c8151e64c632a
SHA256265aa6f0200f338d56502c41b338f3ba328c9a2d7b0c14bae395274361ffbe4d
SHA51238ef10d02b520d8fdf1244addad2edd1ca1f7a6f1d9078d2d080739639b13a26aa02386652a65e4964ac6a19be9fe0b81b93c582b142a4ce4260efa704359898
-
Filesize
180KB
MD5bd99eeca92869f9a3084d689f335c734
SHA1a2839f6038ea50a4456cd5c2a3ea003e7b77688c
SHA25639bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143
SHA512355433c3bbbaa3bcb849633d45713d8a7ac6f87a025732fbe83e259ec3a0cb4eabb18239df26609453f9fc6764c7276c5d0472f11cf12d15ef806aa7594d090e
-
Filesize
991B
MD5ba34620bb7dc75b9798ac856b4c3b85d
SHA1944cafe2a733635b6b68b40caec912508eb30bee
SHA256bda017851bf2afd03b3dd7ca584c03743b675d0fb2bf6a785b6a39af58183a6d
SHA5125b344eaa52a6f1635c374e7bce8c2cc747737e8400fc7c25b42ae282cb8201c1498751772b821f5589a812601f73e12cedfd6255a75f543b0b9c7a6d45337dee