Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
4d4735af8b4bff7c28411a6c45ab0712_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
4d4735af8b4bff7c28411a6c45ab0712_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
4d4735af8b4bff7c28411a6c45ab0712
-
SHA1
29d2150c2481ad8422a6c89efea1eba372a59db0
-
SHA256
84d3d619e2c19d65f1cd545a46284f1b0c8fed90e5e5ae3c2ea2c2fd8cd08dc3
-
SHA512
fa3587957044c7e7140d5897c39ccbbfaf90db55f31ae70d1500c29d572c059d6be87aa13e6d4d2e5275607d11598f7e5d1b057010bc9e2c85a95f1daa933160
-
SSDEEP
12288:RdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:/MIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3380-4-0x0000000000990000-0x0000000000991000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/3136-1-0x0000000140000000-0x000000014010F000-memory.dmp dridex_payload behavioral2/memory/3380-55-0x0000000140000000-0x000000014010F000-memory.dmp dridex_payload behavioral2/memory/3380-43-0x0000000140000000-0x000000014010F000-memory.dmp dridex_payload behavioral2/memory/3136-59-0x0000000140000000-0x000000014010F000-memory.dmp dridex_payload behavioral2/memory/4036-68-0x0000000140000000-0x0000000140155000-memory.dmp dridex_payload behavioral2/memory/4036-73-0x0000000140000000-0x0000000140155000-memory.dmp dridex_payload behavioral2/memory/2248-87-0x0000000140000000-0x0000000140110000-memory.dmp dridex_payload behavioral2/memory/2248-90-0x0000000140000000-0x0000000140110000-memory.dmp dridex_payload behavioral2/memory/1648-104-0x0000000140000000-0x0000000140111000-memory.dmp dridex_payload behavioral2/memory/1648-107-0x0000000140000000-0x0000000140111000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
dpapimig.exeWMPDMC.exemmc.exepid process 4036 dpapimig.exe 2248 WMPDMC.exe 1648 mmc.exe -
Loads dropped DLL 3 IoCs
Processes:
dpapimig.exeWMPDMC.exemmc.exepid process 4036 dpapimig.exe 2248 WMPDMC.exe 1648 mmc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Labelis = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\WORDDO~2\\1033\\Qr\\WMPDMC.exe" -
Processes:
rundll32.exedpapimig.exeWMPDMC.exemmc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WMPDMC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3136 rundll32.exe 3136 rundll32.exe 3136 rundll32.exe 3136 rundll32.exe 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3380 Token: SeCreatePagefilePrivilege 3380 Token: SeShutdownPrivilege 3380 Token: SeCreatePagefilePrivilege 3380 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3380 3380 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3380 wrote to memory of 4636 3380 dpapimig.exe PID 3380 wrote to memory of 4636 3380 dpapimig.exe PID 3380 wrote to memory of 4036 3380 dpapimig.exe PID 3380 wrote to memory of 4036 3380 dpapimig.exe PID 3380 wrote to memory of 4564 3380 WMPDMC.exe PID 3380 wrote to memory of 4564 3380 WMPDMC.exe PID 3380 wrote to memory of 2248 3380 WMPDMC.exe PID 3380 wrote to memory of 2248 3380 WMPDMC.exe PID 3380 wrote to memory of 4932 3380 mmc.exe PID 3380 wrote to memory of 4932 3380 mmc.exe PID 3380 wrote to memory of 1648 3380 mmc.exe PID 3380 wrote to memory of 1648 3380 mmc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d4735af8b4bff7c28411a6c45ab0712_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:4636
-
C:\Users\Admin\AppData\Local\IZ0lC\dpapimig.exeC:\Users\Admin\AppData\Local\IZ0lC\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4036
-
C:\Windows\system32\WMPDMC.exeC:\Windows\system32\WMPDMC.exe1⤵PID:4564
-
C:\Users\Admin\AppData\Local\vKUL\WMPDMC.exeC:\Users\Admin\AppData\Local\vKUL\WMPDMC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2248
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵PID:4932
-
C:\Users\Admin\AppData\Local\CgfCXP\mmc.exeC:\Users\Admin\AppData\Local\CgfCXP\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5465bb03eaaac7f172c1dfe0f0d376223
SHA104405b1e72aa548eeaf3f7fd82c6498861d69f56
SHA25613417bcb305e20ecc76394d3f256a75f7d79a0bc15c0e15f0370b36f8f15b54e
SHA5127183d363552a3362d70cd2e7516b219ef21a11dfc069569cd2fc75fce488f1f0f5a9ed58eeaff02e769733352eb1909a63c023fb252bf826a805b9f188dffa71
-
Filesize
1.8MB
MD58c86b80518406f14a4952d67185032d6
SHA19269f1fbcf65fefbc88a2e239519c21efe0f6ba5
SHA256895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a
SHA5121bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099
-
Filesize
1.3MB
MD52fc4e7fd5ef383b0101a058d68e18aca
SHA1452f2994e397ad5d645165f4b4fc68eb74db1acf
SHA2568618846389b679eeef7d486fbedb2ab45cf301da6cb52c8f4d250b1ba5ce0bd7
SHA5122aea555653e91a6333fa0b53db607c0e1da12609f4dc4b8a4742d264ae30bc8927d190808584a07927c17d6f5fb6f7338a50962a11d8d2078301c003f2274ed0
-
Filesize
76KB
MD5b6d6477a0c90a81624c6a8548026b4d0
SHA1e6eac6941d27f76bbd306c2938c0a962dbf1ced1
SHA256a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb
SHA51272ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe
-
Filesize
1.5MB
MD559ce6e554da0a622febce19eb61c4d34
SHA1176a4a410cb97b3d4361d2aea0edbf17e15d04c7
SHA256c36eba7186f7367fe717595f3372a49503c9613893c2ab2eff38b625a50d04ba
SHA512e9b0d310416b66e0055381391bb6b0c19ee26bbcf0e3bb9ea7d696d5851e6efbdd9bdeb250c74638b7d73b20528ea1dfb718e75ad5977aaad77aae36cc7b7e18
-
Filesize
1.1MB
MD59d8002708665d633c6169430f3a9d406
SHA1e1d81cecb0cfd097347260002d0720e3abd47f42
SHA2565e404db7d8bef52ba17712d0b314970c26689e113433c420d2c06fcc4ce33b53
SHA5126bb5ea811ec4452ce3b7887559bdc5631f9776d904a8ea31d70df18fbd59c96649ba98a7f56fa3ae28c338472f371260db4c8a8e7c1e34df09583dc0a0894065
-
Filesize
1KB
MD50e0f06c866fc494e8755ac34ef565e62
SHA1f191ac9ad73b737114251b3428d88c67bd61c7a1
SHA2563b0fd16bfeddfd54edc156f80e8e1f68c6f74d04556999ef9ad3de264d193845
SHA5128fae8eb31dd37b41e251e044288aef3c9bb9b4a9507b2464dbc01973fa7a6f93fdc188254115bd5f33b8eeae114bd77f3de57160540dd5bae8a532786dea962d