Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
49b478cc38b76090a5dcf3bf2bf85860_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
49b478cc38b76090a5dcf3bf2bf85860_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
49b478cc38b76090a5dcf3bf2bf85860
-
SHA1
17eac34e5fa4b82d401a47c5f5763e918693cac3
-
SHA256
85a83765c561ea8375b492b286a66a6541427217967cd399d2e4e4230141e4e7
-
SHA512
6f37c08e374b6b07a7c45a1521b05d2841864cf66d04044c1db9e6c828cdd877adbd6df0602df8db6df86740c28d72a27ed077c916333e2d08cb3129bae57958
-
SSDEEP
12288:pVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:IfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3500-4-0x00000000033D0000-0x00000000033D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesHardware.exemsra.exeWMPDMC.exepid process 5020 SystemPropertiesHardware.exe 2024 msra.exe 4200 WMPDMC.exe -
Loads dropped DLL 3 IoCs
Processes:
SystemPropertiesHardware.exemsra.exeWMPDMC.exepid process 5020 SystemPropertiesHardware.exe 2024 msra.exe 4200 WMPDMC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qiqbxsgjw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\Recent\\NX1rPUoVT\\msra.exe" -
Processes:
rundll32.exeSystemPropertiesHardware.exemsra.exeWMPDMC.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WMPDMC.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3500 Token: SeCreatePagefilePrivilege 3500 Token: SeShutdownPrivilege 3500 Token: SeCreatePagefilePrivilege 3500 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3500 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3500 wrote to memory of 4464 3500 SystemPropertiesHardware.exe PID 3500 wrote to memory of 4464 3500 SystemPropertiesHardware.exe PID 3500 wrote to memory of 5020 3500 SystemPropertiesHardware.exe PID 3500 wrote to memory of 5020 3500 SystemPropertiesHardware.exe PID 3500 wrote to memory of 5116 3500 msra.exe PID 3500 wrote to memory of 5116 3500 msra.exe PID 3500 wrote to memory of 2024 3500 msra.exe PID 3500 wrote to memory of 2024 3500 msra.exe PID 3500 wrote to memory of 4536 3500 WMPDMC.exe PID 3500 wrote to memory of 4536 3500 WMPDMC.exe PID 3500 wrote to memory of 4200 3500 WMPDMC.exe PID 3500 wrote to memory of 4200 3500 WMPDMC.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49b478cc38b76090a5dcf3bf2bf85860_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵PID:4464
-
C:\Users\Admin\AppData\Local\GJcYk57t\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\GJcYk57t\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5020
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:5116
-
C:\Users\Admin\AppData\Local\8f0ZdzK\msra.exeC:\Users\Admin\AppData\Local\8f0ZdzK\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2024
-
C:\Windows\system32\WMPDMC.exeC:\Windows\system32\WMPDMC.exe1⤵PID:4536
-
C:\Users\Admin\AppData\Local\i48\WMPDMC.exeC:\Users\Admin\AppData\Local\i48\WMPDMC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c5d96671c5c745f43b13366c662339ac
SHA1800a3b339e31d652e3a9ed4c75c9b9dae7964040
SHA2566dc2e498233f5f184b5fc03ba322fd7972d13fed3526e76f0a170eb9fc97820f
SHA51246c9061da8a75be31434c8fb1185d98a567ff88646c364daef0009f803c5918b1efede19c38b63b29884a18924c85914c078b9275d485aa74307fe2bcbca5449
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
1.2MB
MD55d26820f3ba6f42a0f2186c72032305e
SHA141181fdd9831864d5975f3441ba2244c88c6bbb7
SHA256e6fe9f1733ffc50e508b743997b4f62694e1ca8a20c18263d866cdbbb6a8a6c7
SHA5121bb30e84c39f8528cf36fa738063f020f27aba62fa6d64235f044af5609a68d7d5955f07a0027e83c731bd7982ee9dec222d7277bdfebd2131449624e6dfd4d0
-
Filesize
82KB
MD5bf5bc0d70a936890d38d2510ee07a2cd
SHA169d5971fd264d8128f5633db9003afef5fad8f10
SHA256c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7
SHA5120e129044777cbbf5ea995715159c50773c1818fc5e8faa5c827fd631b44c086b34dfdcbe174b105891ccc3882cc63a8664d189fb6a631d8f589de4e01a862f51
-
Filesize
1.2MB
MD5f60c61a2aba49d1ef358da4212b8d248
SHA175af018642ef6b7faa3a249935cb27a3c3ac52a9
SHA256dfdec9657bc9ffca4b9c3096a3e8ed46c2ccd7b36d167dc7e99207a9708e25ac
SHA51298b2c286e2c8ea61cfee4d7f607aa96f4190d2f1841e3bd9e882e1a1a2d166da67ab38dd1b4557ebcede53af37d24837f2ce629f685a66c9f51ba323b404a074
-
Filesize
1.5MB
MD559ce6e554da0a622febce19eb61c4d34
SHA1176a4a410cb97b3d4361d2aea0edbf17e15d04c7
SHA256c36eba7186f7367fe717595f3372a49503c9613893c2ab2eff38b625a50d04ba
SHA512e9b0d310416b66e0055381391bb6b0c19ee26bbcf0e3bb9ea7d696d5851e6efbdd9bdeb250c74638b7d73b20528ea1dfb718e75ad5977aaad77aae36cc7b7e18
-
Filesize
1KB
MD5c7d580a664e3d43d0c6c5e3f76002488
SHA171a6d9e5120e41ca122a2eb5970d0ccb5f253ae3
SHA25662743a39036f21f492d524237b7db12625bc8ff1914c48e64e13697cdb7c0288
SHA51281f59786098476e9ec6da07783965714b9d573667bb2c0964c9666773cbb3e36b10f2ea31429ccb080d093290086a07e7a8f80de55be1562e422483383fa1f0e