Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
71c69de7c83209a1bf71d62abae46b83_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
71c69de7c83209a1bf71d62abae46b83_JaffaCakes118.dll
-
Size
989KB
-
MD5
71c69de7c83209a1bf71d62abae46b83
-
SHA1
2bc4a12a267d0cf44de82094c44c3555f2e775ac
-
SHA256
a00e30735a9c57cf4ecc0b3f55291dd33cb224df7958275b4f4ee68240b2cc20
-
SHA512
8ba0c7e0dc7b8ba55a94792a3e4921792ee6ed314928e5e6a43897e5e8a6ca43a302a978195bb1a1d8bba348f66e656431686aba95fb9d7c580bca5d394b4e11
-
SSDEEP
24576:yVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:yV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3476-4-0x00000000030E0000-0x00000000030E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dialer.exeomadmclient.exeosk.exepid process 2000 dialer.exe 2568 omadmclient.exe 2864 osk.exe -
Loads dropped DLL 4 IoCs
Processes:
dialer.exeomadmclient.exeosk.exepid process 2000 dialer.exe 2568 omadmclient.exe 2568 omadmclient.exe 2864 osk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eeaxmqtu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\UProof\\yawcwx\\omadmclient.exe" -
Processes:
rundll32.exedialer.exeomadmclient.exeosk.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA omadmclient.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2544 rundll32.exe 2544 rundll32.exe 2544 rundll32.exe 2544 rundll32.exe 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 3476 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3476 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3476 wrote to memory of 3604 3476 dialer.exe PID 3476 wrote to memory of 3604 3476 dialer.exe PID 3476 wrote to memory of 2000 3476 dialer.exe PID 3476 wrote to memory of 2000 3476 dialer.exe PID 3476 wrote to memory of 2372 3476 omadmclient.exe PID 3476 wrote to memory of 2372 3476 omadmclient.exe PID 3476 wrote to memory of 2568 3476 omadmclient.exe PID 3476 wrote to memory of 2568 3476 omadmclient.exe PID 3476 wrote to memory of 3104 3476 osk.exe PID 3476 wrote to memory of 3104 3476 osk.exe PID 3476 wrote to memory of 2864 3476 osk.exe PID 3476 wrote to memory of 2864 3476 osk.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71c69de7c83209a1bf71d62abae46b83_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵
-
C:\Users\Admin\AppData\Local\7PafQuST\dialer.exeC:\Users\Admin\AppData\Local\7PafQuST\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\omadmclient.exeC:\Windows\system32\omadmclient.exe1⤵
-
C:\Users\Admin\AppData\Local\2pG\omadmclient.exeC:\Users\Admin\AppData\Local\2pG\omadmclient.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵
-
C:\Users\Admin\AppData\Local\uVwDolObz\osk.exeC:\Users\Admin\AppData\Local\uVwDolObz\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\2pG\XmlLite.dllFilesize
989KB
MD5e9eb1987b6ad493074a85b840fcd956f
SHA1e0a7008f6871ed28e768f3035b4fbc987c15cd53
SHA25692e5835193fe3d597ccee0a7def55cbcb7ff744ccdd68cc227c12efecc583830
SHA512771602424f3024be12d0e8a959eac917e857eb655e392c047797dd6afb247a9c736af3b93aa4dee935114baaabf431ffcacd2fc97f4d699978ec445e43f9e178
-
C:\Users\Admin\AppData\Local\2pG\omadmclient.exeFilesize
425KB
MD58992b5b28a996eb83761dafb24959ab4
SHA1697ecb33b8ff5b0e73ef29ce471153b368b1b729
SHA256e0c6c1b082c5d61be95b7fad95155b7cb2e516d6dcd51b8e1554a176876699e7
SHA5124ab0d71f6f9e5a5d0870d8e6eaa4b5db74ea6148de0a00603e3e56303d0fec4722172e0207b9678a5bd0136f2d43d43b9d34907183369ab3b9b9c1484034fe3d
-
C:\Users\Admin\AppData\Local\7PafQuST\TAPI32.dllFilesize
997KB
MD504226356be73bc5bcbabcfa6eafce8de
SHA19fdde709ee775687518a080d331351dd6933e472
SHA256f652e5a36060b142583b4a5dd3fed37d19ecb852067f1f19a92e416de82428fe
SHA51246e3b525c08e36fe6abd8879f608015e1cf31cf50b0cf7d60adfa20bd6b130194833fd1379fee0bcd2953b726cb6df38920f7962642e88d748c351a4ab71060b
-
C:\Users\Admin\AppData\Local\7PafQuST\dialer.exeFilesize
39KB
MD5b2626bdcf079c6516fc016ac5646df93
SHA1838268205bd97d62a31094d53643c356ea7848a6
SHA256e3ac5e6196f3a98c1946d85c653866c318bb2a86dd865deffa7b52f665d699bb
SHA512615cfe1f91b895513c687906bf3439ca352afcadd3b73f950af0a3b5fb1b358168a7a25a6796407b212fde5f803dd880bcdc350d8bac7e7594090d37ce259971
-
C:\Users\Admin\AppData\Local\uVwDolObz\OLEACC.dllFilesize
990KB
MD5f9315e8f4a024c23abdf392d2c558a9c
SHA135aacdf9e0162f0ededc9db1fb70f7358cfcb2a1
SHA2567ed2c58fe4a7ce3434cf81d289714a8c4dfcb9c6c028816c7ac780902ae5a1e1
SHA512de4ef2923426035eb63d32a3a565a22ebe4459af65bc4d91e9c8101b5a6336717c21b1cbd7724aa1915880512c85554628de370361d32774e4a9379221f7993c
-
C:\Users\Admin\AppData\Local\uVwDolObz\osk.exeFilesize
638KB
MD5745f2df5beed97b8c751df83938cb418
SHA12f9fc33b1bf28e0f14fd75646a7b427ddbe14d25
SHA256f67ef6e31fa0eaed44bfbab5b908be06b56cbc7d5a16ab2a72334d91f2bb6a51
SHA5122125d021e6f45a81bd75c9129f4b098ad9aa15c25d270051f4da42458a9737bff44d6adf17aa1f2547715d159fb621829f7cd3b9d42f1521c919549cc7deb228
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Rkjap.lnkFilesize
1KB
MD5834ec5abd5d86f8447841e3897e9af5d
SHA13a9aaf29b837c002e525c725514e3efb24b45f54
SHA2569e778ab8afc15799772b8108f942a6613709704c1c750326beddc2752b45bd43
SHA512aee10532e746fe3bd1fdb85e76f1ac81ef4849ce6678d9809953ebab834c4e45b77c5cd9b6d9343def372a611abbcd457f9d0b5c6d54c8b6578e2c197c338a27
-
memory/2000-50-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2000-47-0x00000240B5C20000-0x00000240B5C27000-memory.dmpFilesize
28KB
-
memory/2000-44-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2544-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2544-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2544-3-0x000001773B630000-0x000001773B637000-memory.dmpFilesize
28KB
-
memory/2568-65-0x000001DB4C470000-0x000001DB4C477000-memory.dmpFilesize
28KB
-
memory/2568-68-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2568-62-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2864-87-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2864-84-0x000002476F480000-0x000002476F487000-memory.dmpFilesize
28KB
-
memory/3476-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-26-0x00007FFCD55DA000-0x00007FFCD55DB000-memory.dmpFilesize
4KB
-
memory/3476-27-0x00000000029D0000-0x00000000029D7000-memory.dmpFilesize
28KB
-
memory/3476-34-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-28-0x00007FFCD6B50000-0x00007FFCD6B60000-memory.dmpFilesize
64KB
-
memory/3476-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-22-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-6-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3476-4-0x00000000030E0000-0x00000000030E1000-memory.dmpFilesize
4KB