Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
211cf9ae6ca6a0e4a98dacd5eda8d14a_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
211cf9ae6ca6a0e4a98dacd5eda8d14a_JaffaCakes118.dll
-
Size
2.3MB
-
MD5
211cf9ae6ca6a0e4a98dacd5eda8d14a
-
SHA1
ef0761f5ae25b3dfdf9f57941134dd26924867f3
-
SHA256
b579608532ee7162cb68571b74d3b13838d6719133f75eaa6cb3c7a57bfe231f
-
SHA512
37810a5d53e9f846c2f7c76bb02d92fe58af6efe0f25e31f260f0ce4860df01ab7cd1128825323fef607731d0f6e57c2b7bc249b508f7cce0c39684a213347f3
-
SSDEEP
12288:/VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1gpE:2fP7fWsK5z9A+WGAW+V5SB6Ct4bnbg
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3520-4-0x00000000023F0000-0x00000000023F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesComputerName.exedwm.exeTaskmgr.exepid process 2348 SystemPropertiesComputerName.exe 4896 dwm.exe 2752 Taskmgr.exe -
Loads dropped DLL 4 IoCs
Processes:
SystemPropertiesComputerName.exedwm.exeTaskmgr.exepid process 2348 SystemPropertiesComputerName.exe 4896 dwm.exe 4896 dwm.exe 2752 Taskmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pzfwfhktmuesbir = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Templates\\LiveContent\\16\\Managed\\LDO\\dwm.exe" -
Processes:
rundll32.exeSystemPropertiesComputerName.exedwm.exeTaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1844 rundll32.exe 1844 rundll32.exe 1844 rundll32.exe 1844 rundll32.exe 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3520 3520 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3520 wrote to memory of 3416 3520 SystemPropertiesComputerName.exe PID 3520 wrote to memory of 3416 3520 SystemPropertiesComputerName.exe PID 3520 wrote to memory of 2348 3520 SystemPropertiesComputerName.exe PID 3520 wrote to memory of 2348 3520 SystemPropertiesComputerName.exe PID 3520 wrote to memory of 1132 3520 dwm.exe PID 3520 wrote to memory of 1132 3520 dwm.exe PID 3520 wrote to memory of 4896 3520 dwm.exe PID 3520 wrote to memory of 4896 3520 dwm.exe PID 3520 wrote to memory of 3708 3520 Taskmgr.exe PID 3520 wrote to memory of 3708 3520 Taskmgr.exe PID 3520 wrote to memory of 2752 3520 Taskmgr.exe PID 3520 wrote to memory of 2752 3520 Taskmgr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\211cf9ae6ca6a0e4a98dacd5eda8d14a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵PID:3416
-
C:\Users\Admin\AppData\Local\fgrzg\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\fgrzg\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2348
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:1132
-
C:\Users\Admin\AppData\Local\nOpnbww4\dwm.exeC:\Users\Admin\AppData\Local\nOpnbww4\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4896
-
C:\Windows\system32\Taskmgr.exeC:\Windows\system32\Taskmgr.exe1⤵PID:3708
-
C:\Users\Admin\AppData\Local\wKw\Taskmgr.exeC:\Users\Admin\AppData\Local\wKw\Taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD54bc748ca89129237b03cd9dc9b242d2f
SHA1a87fd158b629e750d770b859c12733489cfdd5ea
SHA256537f312ead9934c5e6cdb644706967bf31f9136d08c1ca352409d15c764ca381
SHA51284ae72259cddc39ef06791647f0cb9f75e3606f2b41116628b83d74bf6d9972b9de3c83dea7230b434b8bfe27500ad09b85acfadc4556fb94ccd995ddaf43caf
-
Filesize
82KB
MD56711765f323289f5008a6a2a04b6f264
SHA1d8116fdf73608b4b254ad83c74f2232584d24144
SHA256bd3a97327326e2245938ec6099f20059b446ff0fe1c10b9317d15d1a1dd5331e
SHA512438abd282d9d1c0e7e5db2ce027ff9522c3980278b32b2eae09c595884a8dcbfd5178bc5926b1d15f03174303382e13f5d5ecab9a5d8e31fc07ef39e66c012e8
-
Filesize
92KB
MD55c27608411832c5b39ba04e33d53536c
SHA1f92f8b7439ce1de4c297046ed1d3ff9f20bc97af
SHA2560ac827c9e35cdaa492ddd435079415805dcc276352112b040bcd34ef122cf565
SHA5121fa25eabc08dff9ea25dfa7da310a677927c6344b76815696b0483f8860fa1469820ff15d88a78ed32f712d03003631d9aceaf9c9851de5dd40c1fc2a7bc1309
-
Filesize
2.3MB
MD52ca380b8f204f6f90ba8f3583823d17b
SHA1107b0391673c7271b616428d192c967cdb7fb5ed
SHA25677d6052ec79f56bf3dfc32e384a8efb7826783191184210519df542be18332c1
SHA51220492807d53a739f9bb758fce8556ceecf7398dddf708e2c768a54ed91fa3c409d0d325e70fcb5b6e73bc97c1a26f1adebc24c9df1207183ac708c6a05a85f18
-
Filesize
2.6MB
MD576dd81aa0053050d3638ab7e9ab75832
SHA1232ac24d4db5f0878131287fdc4d07988c5e6804
SHA25699f8f475b6c6f911709fa11d7a0fb0350859bc2ebc4423755b3db6b325b65b79
SHA512a467801643b9cf4906ab28eb35315166dbc4cf518a877dfe8ae132e3b64168ed6292b97994d108f077dfa7c3d6a8fe21a4e99ea4914d1afc92d699f7a5aa927f
-
Filesize
1.2MB
MD558d5bc7895f7f32ee308e34f06f25dd5
SHA17a7f5e991ddeaf73e15a0fdcb5c999c0248a2fa4
SHA2564e305198f15bafd5728b5fb8e7ff48d9f312399c744ecfea0ecac79d93c5e478
SHA512872c84c92b0e4050ae4a4137330ec3cda30008fd15d6413bf7a913c03a021ad41b6131e5a7356b374ced98d37ae207147ebefd93893560dc15c3e9875f93f7a9
-
Filesize
1KB
MD58fb22b2585bfcf3aa2ebaf6c1d41584a
SHA13eb58756b8b77e2c761c118c3e52686b3fd8ce13
SHA256fafd529b54949179cd6a9e1e1d148228020042c91fa857fe98077e374e8ae743
SHA5129eff2510bc07bfe5dba8744fea8e2befac03832ac6dd05af89b88fd862d68060be9c250c96c4f6b6deb21b9a092dddf683c67ad6a47b283536cf5b46d04dddf6