Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 14:21
Static task
static1
Behavioral task
behavioral1
Sample
35402b3c982a44a776ba3dd4be28b519_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
35402b3c982a44a776ba3dd4be28b519_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
35402b3c982a44a776ba3dd4be28b519
-
SHA1
7a274533a4fea0f23671f61e6b81ad52495a86cb
-
SHA256
95fbd267e006535acc4bd1284e17c966f7862332aa3978e7008db0113e339616
-
SHA512
713ba3d9c712d64be42845d5b15c0014e3db2025eba7efb8ea977b4e68fa61d85afc006f1afeeed5f2fed61d33fd24fe2e22c112cbf83e99d1cf48b110eaba25
-
SSDEEP
12288:sdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:eMIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3468-4-0x0000000002CD0000-0x0000000002CD1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/804-0-0x0000000140000000-0x000000014014D000-memory.dmp dridex_payload behavioral2/memory/3468-42-0x0000000140000000-0x000000014014D000-memory.dmp dridex_payload behavioral2/memory/804-57-0x0000000140000000-0x000000014014D000-memory.dmp dridex_payload behavioral2/memory/3468-54-0x0000000140000000-0x000000014014D000-memory.dmp dridex_payload behavioral2/memory/5088-67-0x0000000140000000-0x000000014014E000-memory.dmp dridex_payload behavioral2/memory/5088-71-0x0000000140000000-0x000000014014E000-memory.dmp dridex_payload behavioral2/memory/864-84-0x0000000140000000-0x0000000140193000-memory.dmp dridex_payload behavioral2/memory/864-82-0x0000000140000000-0x0000000140193000-memory.dmp dridex_payload behavioral2/memory/864-89-0x0000000140000000-0x0000000140193000-memory.dmp dridex_payload behavioral2/memory/3880-107-0x0000000140000000-0x000000014014E000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
wextract.exePasswordOnWakeSettingFlyout.exeslui.exepid process 5088 wextract.exe 864 PasswordOnWakeSettingFlyout.exe 3880 slui.exe -
Loads dropped DLL 3 IoCs
Processes:
wextract.exePasswordOnWakeSettingFlyout.exeslui.exepid process 5088 wextract.exe 864 PasswordOnWakeSettingFlyout.exe 3880 slui.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzvdnevrdk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\DOCUME~1\\dm1x1LW\\PASSWO~1.EXE" -
Processes:
slui.exerundll32.exewextract.exePasswordOnWakeSettingFlyout.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordOnWakeSettingFlyout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 804 rundll32.exe 804 rundll32.exe 804 rundll32.exe 804 rundll32.exe 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 3468 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3468 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3468 wrote to memory of 4396 3468 wextract.exe PID 3468 wrote to memory of 4396 3468 wextract.exe PID 3468 wrote to memory of 5088 3468 wextract.exe PID 3468 wrote to memory of 5088 3468 wextract.exe PID 3468 wrote to memory of 1072 3468 PasswordOnWakeSettingFlyout.exe PID 3468 wrote to memory of 1072 3468 PasswordOnWakeSettingFlyout.exe PID 3468 wrote to memory of 864 3468 PasswordOnWakeSettingFlyout.exe PID 3468 wrote to memory of 864 3468 PasswordOnWakeSettingFlyout.exe PID 3468 wrote to memory of 3576 3468 slui.exe PID 3468 wrote to memory of 3576 3468 slui.exe PID 3468 wrote to memory of 3880 3468 slui.exe PID 3468 wrote to memory of 3880 3468 slui.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35402b3c982a44a776ba3dd4be28b519_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:804
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵PID:4396
-
C:\Users\Admin\AppData\Local\A01D0O\wextract.exeC:\Users\Admin\AppData\Local\A01D0O\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5088
-
C:\Windows\system32\PasswordOnWakeSettingFlyout.exeC:\Windows\system32\PasswordOnWakeSettingFlyout.exe1⤵PID:1072
-
C:\Users\Admin\AppData\Local\54kh9g\PasswordOnWakeSettingFlyout.exeC:\Users\Admin\AppData\Local\54kh9g\PasswordOnWakeSettingFlyout.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:864
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:3576
-
C:\Users\Admin\AppData\Local\OMb\slui.exeC:\Users\Admin\AppData\Local\OMb\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5a35cecab1f72ea6899220619a37af29c
SHA143379ff74426f0850be48c2f0496d6d77a305f41
SHA256444b30665cd7f314d84b4ff9c14498f27f097f36fb3c95a74f0e029a983270ea
SHA51249d83d81585f5a6365f7cde08ff4347516fe2039a99f01685f842e46fa7ab86139e406117c6e1fa3ec32e1963b7b5cade7c940a4cf9668f5f3d67c08651ca3e3
-
Filesize
44KB
MD5591a98c65f624c52882c2b238d6cd4c4
SHA1c960d08c19d777069cf265dcc281807fbd8502d7
SHA2565e6ed524c955fb1ea3e24f132987143da3ec81db5041a0edcfa7bf3ac790eb06
SHA5121999f23c90d85857461f8ddc5342470296f6939a654ac015780c2977f293c1f799fc992462f3d4d9181c97ab960db3291b85ea7c0537edcb57755706b20b6074
-
Filesize
1.3MB
MD53b696239856f5e81e8ca857f8fad81f4
SHA14027f7e1a613432b15a46dca6095f97cea5a3679
SHA2563ae32b9c5c43c09c9b4fb62725276a920e5c86743690316543d62512f0f515a3
SHA5123cfb9e1eb594cfdbcd13089a51d7c192a2d7e16250e646d484183da47356881fbaa30a6fd1efe57f3d543cbab1d8add6dbb44dbea99b542ddeab36a057b74fe4
-
Filesize
143KB
MD556e501e3e49cfde55eb1caabe6913e45
SHA1ab2399cbf17dbee7b302bea49e40d4cee7caea76
SHA256fbb6dc62abeeb222b49a63f43dc6eea96f3d7e9a8da55381c15d57a5d099f3e0
SHA5122b536e86cbd8ab026529ba2c72c0fda97e9b6f0bc4fd96777024155852670cb41d17937cde372a44cdbad3e53b8cd3ef1a4a3ee9b34dfb3c2069822095f7a172
-
Filesize
1.3MB
MD5290b65452dae2678a771c310a2f7daf2
SHA119e707821883096ec9a636675bdeef34fe03a7e3
SHA256cc9aa350c470d26df8f9d3a609f8eaf97b6995d0c8d950a3e7daf53d3c892fd6
SHA5124d74f77b66cac4466f2f0674433e07d7b33e9f4f47da6fdda1d886623adc9e664cb565f51665c2dc424f8f766805296ef52809f5c0f4bd0c7cd626362cb30b20
-
Filesize
534KB
MD5eb725ea35a13dc18eac46aa81e7f2841
SHA1c0b3304c970324952e18c4a51073e3bdec73440b
SHA25625e7624d469a592934ab8c509d12c153c2799e604c2a4b8a83650a7268577dff
SHA51239192a1fad29654b3769f007298eff049d0688a3cb51390833ec563f44f9931cd3f6f8693db37b649b061b5aab379b166c15dade56d0fc414375243320375b26
-
Filesize
1KB
MD5ab98c194cf9b20ac6c016b422f9687de
SHA15a797852ccd5f6df778c40868a8abd3002e41ffe
SHA256b7da194340990c318267668dd2e2d7a867b32107b0072556c10f20af3e75ff36
SHA512cebdc1aea0931d8f17dd74d8b09795f3e14555ebdbec3f2a3f0e63662384a91126be6c2fb6b656ba8d0e2227962682adda53d8dd5a835484d3053c16b1a41976