Analysis
-
max time kernel
149s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
65eedb07a6f749ad69bd6a937505442f_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
65eedb07a6f749ad69bd6a937505442f_JaffaCakes118.dll
-
Size
816KB
-
MD5
65eedb07a6f749ad69bd6a937505442f
-
SHA1
8a37ca00b017b63c3d231302419d2e89a06d5b7d
-
SHA256
de08365e362b2d95838d2a3a7a3bcae93cde512cbcc6e0cdbf60f2588350a572
-
SHA512
d9b1bcdd1c5d0f6ee6f8ec326a7a1cf5370241475204d3fc31f91f31ab76b42e3e5b5fec7402335b46405d2fa47ccdab5e719b71502b3075f6802d0a35551512
-
SSDEEP
12288:XdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:tMIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3476-3-0x0000000003410000-0x0000000003411000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/4088-1-0x0000000140000000-0x00000001400CC000-memory.dmp dridex_payload behavioral2/memory/3476-46-0x0000000140000000-0x00000001400CC000-memory.dmp dridex_payload behavioral2/memory/4088-56-0x0000000140000000-0x00000001400CC000-memory.dmp dridex_payload behavioral2/memory/3476-58-0x0000000140000000-0x00000001400CC000-memory.dmp dridex_payload behavioral2/memory/404-68-0x0000000140000000-0x00000001400CD000-memory.dmp dridex_payload behavioral2/memory/404-72-0x0000000140000000-0x00000001400CD000-memory.dmp dridex_payload behavioral2/memory/696-88-0x0000000140000000-0x00000001400CD000-memory.dmp dridex_payload behavioral2/memory/4520-100-0x0000000140000000-0x00000001400D3000-memory.dmp dridex_payload behavioral2/memory/4520-103-0x0000000140000000-0x00000001400D3000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
dxgiadaptercache.exeSystemPropertiesHardware.exemspaint.exepid Process 404 dxgiadaptercache.exe 696 SystemPropertiesHardware.exe 4520 mspaint.exe -
Loads dropped DLL 3 IoCs
Processes:
dxgiadaptercache.exeSystemPropertiesHardware.exemspaint.exepid Process 404 dxgiadaptercache.exe 696 SystemPropertiesHardware.exe 4520 mspaint.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pzfwfhktmuesbir = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\PRINTE~1\\DQEPI6~1\\SYSTEM~1.EXE" -
Processes:
rundll32.exedxgiadaptercache.exeSystemPropertiesHardware.exemspaint.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dxgiadaptercache.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 4088 rundll32.exe 4088 rundll32.exe 4088 rundll32.exe 4088 rundll32.exe 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3476 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3476 wrote to memory of 1388 3476 97 PID 3476 wrote to memory of 1388 3476 97 PID 3476 wrote to memory of 404 3476 98 PID 3476 wrote to memory of 404 3476 98 PID 3476 wrote to memory of 4192 3476 99 PID 3476 wrote to memory of 4192 3476 99 PID 3476 wrote to memory of 696 3476 100 PID 3476 wrote to memory of 696 3476 100 PID 3476 wrote to memory of 528 3476 101 PID 3476 wrote to memory of 528 3476 101 PID 3476 wrote to memory of 4520 3476 102 PID 3476 wrote to memory of 4520 3476 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65eedb07a6f749ad69bd6a937505442f_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
C:\Windows\system32\dxgiadaptercache.exeC:\Windows\system32\dxgiadaptercache.exe1⤵PID:1388
-
C:\Users\Admin\AppData\Local\W3ZDL\dxgiadaptercache.exeC:\Users\Admin\AppData\Local\W3ZDL\dxgiadaptercache.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:404
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵PID:4192
-
C:\Users\Admin\AppData\Local\Oz9tlotl\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\Oz9tlotl\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:696
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵PID:528
-
C:\Users\Admin\AppData\Local\xHwtbucr\mspaint.exeC:\Users\Admin\AppData\Local\xHwtbucr\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD5e17f63efe15749b7c1f5766ab86a9d53
SHA1322c0fcbdb5196dd73e0d85ec4b4028f3c7522b5
SHA256253a74be8203f8c4dce9c0bfe778617264581fb2000b3cfa2ac12bdcc34d559f
SHA512855346be6966f78e1b137b81d3c2b09db47e5997788031227daa375ff3ba0f7da428b7890c8187d1ca281ec18be0df252d2930ffb7f291abbba8bd0be146f3ba
-
Filesize
82KB
MD5bf5bc0d70a936890d38d2510ee07a2cd
SHA169d5971fd264d8128f5633db9003afef5fad8f10
SHA256c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7
SHA5120e129044777cbbf5ea995715159c50773c1818fc5e8faa5c827fd631b44c086b34dfdcbe174b105891ccc3882cc63a8664d189fb6a631d8f589de4e01a862f51
-
Filesize
820KB
MD555c1392c4375b3a14f69cdd75d98e550
SHA1e045915ff38bbb48edc314e6756bc5eda594c5b5
SHA256b35109df9130ed1fb9b42a785a5e0df73b36c12a6c6dfd3451f0b0e86d973ded
SHA51280f26de9451d710384ebd5157c6b5e4626ff30d9ca9e8caa50285948e1814c3c7f180be3eeaaba1f58756192bb1fd9eea4cfdd18eefea77d2ad2eb5e067a9a50
-
Filesize
230KB
MD5e62f89130b7253f7780a862ed9aff294
SHA1b031e64a36e93f95f2061be5b0383069efac2070
SHA2564bea9f741fe4ca9d6262477849896b9fa6377326d11af044561c31bde2d994b5
SHA51205649d38a0b5d825bb8442549427b0ff77b139c9dd297b04d6c0fb1415504c95ed750cd79efea2ff514abfc5d1003e6251a3cd871d352dcea06be0cdeb0304f7
-
Filesize
844KB
MD57c4c707318609e0d3efa89f82e08b143
SHA13cd70b8c7ae25c1d6bbec72ed5c4086cc00ce217
SHA2566f8a109ce0536e52b8d97ee44159ed5fd3ae5b9ad65a4cc2f1a99d4813cb1a1b
SHA512f546b5cc931335e88fe9c8557cab08894834d2554c9b31712605983360600b6b691806b6ed57cfa383b4461f0fdc2745405cfc280573d3e154998bc94f576816
-
Filesize
965KB
MD5f221a4ccafec690101c59f726c95b646
SHA12098e4b62eaab213cbee73ba40fe4f1b8901a782
SHA25694aa32a2c9c1d2db78318d9c68262c2f834abe26b6e9a661700324b55fdd5709
SHA5128e3f4e4f68565ef09f5e762d6bb41b160711bbacac9dfcbe33edea9885fd042e6ce9a248bfcc62f9cffdb8e6bbe1b04c89bd41fcd9a373a5c8bc7bbff96dceaf
-
Filesize
1KB
MD5157754b07f25d247b62f8b9f61d1b74e
SHA1230356135c7eef89aea0bb5218517472ba34d7d5
SHA256df2fdb3a32a05dd7c09e6c9ad15531d50d47e346dc1cc6c7cc96ac61b5e02797
SHA5125b83eee0d9034e24de559a18c32aa3bf530495b7caae2306bc9d8a5e578ffec2b5b6a2298988999f8dfb9f5edccbb5f5623c04c6230e2a9eadfd23ca947e599c