Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
049096c3169d8d3df37231056cc1ddc5_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
049096c3169d8d3df37231056cc1ddc5_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
049096c3169d8d3df37231056cc1ddc5
-
SHA1
a11b8d2b9144cfd9d15bb696ac117ab725484e86
-
SHA256
221471dd6a3b6edc506fd5e9e0d32c3bd5fb95f631ef02bb2dfa56ff04a9e248
-
SHA512
1c63495a42cf214e9a475877e94fe51994efa724c1f189209e7ed4503d3e52da46dcf34d4bbea055534db6b1fee9f5c8f1ebe42da60d4c2fa375688ec83fa9a2
-
SSDEEP
12288:cdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:uMIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3608-3-0x00000000008C0000-0x00000000008C1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/1300-1-0x0000000140000000-0x000000014014C000-memory.dmp dridex_payload behavioral2/memory/3608-52-0x0000000140000000-0x000000014014C000-memory.dmp dridex_payload behavioral2/memory/3608-40-0x0000000140000000-0x000000014014C000-memory.dmp dridex_payload behavioral2/memory/1300-55-0x0000000140000000-0x000000014014C000-memory.dmp dridex_payload behavioral2/memory/4644-62-0x0000000140000000-0x000000014014D000-memory.dmp dridex_payload behavioral2/memory/4644-67-0x0000000140000000-0x000000014014D000-memory.dmp dridex_payload behavioral2/memory/1556-83-0x0000000140000000-0x000000014014D000-memory.dmp dridex_payload behavioral2/memory/1344-104-0x0000000140000000-0x0000000140153000-memory.dmp dridex_payload behavioral2/memory/1344-106-0x0000000140000000-0x0000000140153000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
pid Process 4644 sigverif.exe 1556 usocoreworker.exe 4680 consent.exe 1344 msconfig.exe -
Loads dropped DLL 3 IoCs
pid Process 4644 sigverif.exe 1556 usocoreworker.exe 1344 msconfig.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wbdoaalrz = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\3WM5j8AA\\usocoreworker.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA usocoreworker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1300 rundll32.exe 1300 rundll32.exe 1300 rundll32.exe 1300 rundll32.exe 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found 3608 Process not Found -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3608 wrote to memory of 2276 3608 Process not Found 87 PID 3608 wrote to memory of 2276 3608 Process not Found 87 PID 3608 wrote to memory of 4644 3608 Process not Found 88 PID 3608 wrote to memory of 4644 3608 Process not Found 88 PID 3608 wrote to memory of 2200 3608 Process not Found 91 PID 3608 wrote to memory of 2200 3608 Process not Found 91 PID 3608 wrote to memory of 1556 3608 Process not Found 92 PID 3608 wrote to memory of 1556 3608 Process not Found 92 PID 3608 wrote to memory of 4004 3608 Process not Found 93 PID 3608 wrote to memory of 4004 3608 Process not Found 93 PID 3608 wrote to memory of 4680 3608 Process not Found 94 PID 3608 wrote to memory of 4680 3608 Process not Found 94 PID 3608 wrote to memory of 4044 3608 Process not Found 95 PID 3608 wrote to memory of 4044 3608 Process not Found 95 PID 3608 wrote to memory of 1344 3608 Process not Found 96 PID 3608 wrote to memory of 1344 3608 Process not Found 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\049096c3169d8d3df37231056cc1ddc5_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵PID:2276
-
C:\Users\Admin\AppData\Local\gJEy\sigverif.exeC:\Users\Admin\AppData\Local\gJEy\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4644
-
C:\Windows\system32\usocoreworker.exeC:\Windows\system32\usocoreworker.exe1⤵PID:2200
-
C:\Users\Admin\AppData\Local\fzg61G\usocoreworker.exeC:\Users\Admin\AppData\Local\fzg61G\usocoreworker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1556
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:4004
-
C:\Users\Admin\AppData\Local\XSRDN\consent.exeC:\Users\Admin\AppData\Local\XSRDN\consent.exe1⤵
- Executes dropped EXE
PID:4680
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:4044
-
C:\Users\Admin\AppData\Local\Dc5rw\msconfig.exeC:\Users\Admin\AppData\Local\Dc5rw\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD50684b4290c475356aa4e931c79a9bc47
SHA1d3f75064ace6b009339071a0b8c5291d632eb576
SHA256dede4595822c83328fc932b902f116c76efc11ea9f22b80b814ae4ec0d3ec42f
SHA51274a75cc109705cbded39206d5ec55927e85b50f033ffcb26f6f6d17e6e6224ae416ca267f23a8b2d29f471a693230b5a628c9a70732eb0a9c54cbb80571a5c6c
-
Filesize
193KB
MD539009536cafe30c6ef2501fe46c9df5e
SHA16ff7b4d30f31186de899665c704a105227704b72
SHA25693d2604f7fdf7f014ac5bef63ab177b6107f3cfc26da6cbd9a7ab50c96564a04
SHA51295c9a8bc61c79108634f5578825544323e3d980ae97a105a325c58bc0e44b1d500637459969602f08d6d23d346baec6acd07d8351803981000c797190d48f03a
-
Filesize
162KB
MD56646631ce4ad7128762352da81f3b030
SHA11095bd4b63360fc2968d75622aa745e5523428ab
SHA25656b2d516376328129132b815e22379ae8e7176825f059c9374a33cc844482e64
SHA5121c00ed5d8568f6ebd119524b61573cfe71ca828bd8fbdd150158ec8b5db65fa066908d120d201fce6222707bcb78e0c1151b82fdc1dccf3ada867cb810feb6da
-
Filesize
1.3MB
MD5376c96194147ce3a52ecde8574e2bdc0
SHA1e8275f7b6f6bc2bdf39f86bb74826378e37a0fee
SHA25659464d077a216668433248fd3db7f1f16beba9c8f18c31a46f25b7124a59cee0
SHA51294117640632c68e673979351b7bf6bbbaf6f183a535e5e11790285c4eb42fa4ccdb8cd987c850ce2ca20bd21c2fd4b9be08937c84bb1e177d22885c8812d6e40
-
Filesize
1.3MB
MD52c5efb321aa64af37dedc6383ce3198e
SHA1a06d7020dd43a57047a62bfb443091cd9de946ba
SHA2560fb6688a32340036f3eaab4a09a82dee533bfb2ca266c36f6142083134de6f0e
SHA5125448ea01b24af7444505bda80064849a2efcc459011d32879e021e836fd573c9b1b9d3b37291d3f53ff536c691ac13a545b12f318a16c8a367421986bbf002ed
-
Filesize
1.3MB
MD5e6a196f7994e1d46f8d3da0d93a54f22
SHA1226d957bcc93691db438c7bc7f2607cd958012a6
SHA256fbb116def4149bafc9b4956198002d7b25a278436a24cddc12054a04818bb8ac
SHA51243a2606a8e6600737957663bf395c1383127fcd382d338ca435158030a0e96f1d3eec34ff6a7c5ecaae0403df52985d9bf839896b3d92b94964e32f62261b3c2
-
Filesize
77KB
MD52151a535274b53ba8a728e542cbc07a8
SHA1a2304c0f2616a7d12298540dce459dd9ccf07443
SHA256064de47877b00dc35886e829a697e4adb3d3cfdf294ddba13b6009a0f415b1bd
SHA512e6fd520ee1bd80a5fe8a7c2ae6446dcaabd4e335a602c36356f85305abef751b7dffa7eaac1ec13c105ccd8c3e9070bd32ed4b14bc8a9e52dc5f47b936d69a9f
-
Filesize
1KB
MD5d9f00ef223e7ed93e06618ea4a36bf69
SHA1af7b4ab261faf972ad8be8e8317d3c388e2a5940
SHA256d1c5044ec73d72d32f8cf1925f99538a157645cc729d37d905cb7d5047af72d6
SHA512ebfea1b9baa3a1fd9add35d0b0057d8fa6c407b34d52e31a1b97831eefa6e7b594270c490567aa92c0e55eb2e853554323b4eae14d4c30bcab79abdd26157653