Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
b3f3a7a92eec72e39d8a9277730a077e_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
b3f3a7a92eec72e39d8a9277730a077e_JaffaCakes118.dll
-
Size
993KB
-
MD5
b3f3a7a92eec72e39d8a9277730a077e
-
SHA1
39ec84a1246b2ae1a5f3307cd100fe59025967e5
-
SHA256
3b11229202dc3871b693be51b91981a7050d395fed046f2a71895ed88ee4d6a0
-
SHA512
475f1c60b1f75013f219761d0e9bfe5c397d2c1c61e6d9aff59f66529ff35b3134cb93708d2206a4691d4d7f67d1b484217abf8a407d1fca9d6969a7d95937dd
-
SSDEEP
24576:OVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:OV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1188-5-0x0000000002570000-0x0000000002571000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
PresentationSettings.exeAdapterTroubleshooter.exeEhStorAuthn.exepid process 2560 PresentationSettings.exe 1976 AdapterTroubleshooter.exe 3048 EhStorAuthn.exe -
Loads dropped DLL 7 IoCs
Processes:
PresentationSettings.exeAdapterTroubleshooter.exeEhStorAuthn.exepid process 1188 2560 PresentationSettings.exe 1188 1976 AdapterTroubleshooter.exe 1188 3048 EhStorAuthn.exe 1188 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tonqjizj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\aJMDhEG\\AdapterTroubleshooter.exe" -
Processes:
rundll32.exePresentationSettings.exeAdapterTroubleshooter.exeEhStorAuthn.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdapterTroubleshooter.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1188 wrote to memory of 2020 1188 PresentationSettings.exe PID 1188 wrote to memory of 2020 1188 PresentationSettings.exe PID 1188 wrote to memory of 2020 1188 PresentationSettings.exe PID 1188 wrote to memory of 2560 1188 PresentationSettings.exe PID 1188 wrote to memory of 2560 1188 PresentationSettings.exe PID 1188 wrote to memory of 2560 1188 PresentationSettings.exe PID 1188 wrote to memory of 1944 1188 AdapterTroubleshooter.exe PID 1188 wrote to memory of 1944 1188 AdapterTroubleshooter.exe PID 1188 wrote to memory of 1944 1188 AdapterTroubleshooter.exe PID 1188 wrote to memory of 1976 1188 AdapterTroubleshooter.exe PID 1188 wrote to memory of 1976 1188 AdapterTroubleshooter.exe PID 1188 wrote to memory of 1976 1188 AdapterTroubleshooter.exe PID 1188 wrote to memory of 3024 1188 EhStorAuthn.exe PID 1188 wrote to memory of 3024 1188 EhStorAuthn.exe PID 1188 wrote to memory of 3024 1188 EhStorAuthn.exe PID 1188 wrote to memory of 3048 1188 EhStorAuthn.exe PID 1188 wrote to memory of 3048 1188 EhStorAuthn.exe PID 1188 wrote to memory of 3048 1188 EhStorAuthn.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3f3a7a92eec72e39d8a9277730a077e_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵
-
C:\Users\Admin\AppData\Local\D0qH\PresentationSettings.exeC:\Users\Admin\AppData\Local\D0qH\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\AdapterTroubleshooter.exeC:\Windows\system32\AdapterTroubleshooter.exe1⤵
-
C:\Users\Admin\AppData\Local\ehTv\AdapterTroubleshooter.exeC:\Users\Admin\AppData\Local\ehTv\AdapterTroubleshooter.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵
-
C:\Users\Admin\AppData\Local\5C54w\EhStorAuthn.exeC:\Users\Admin\AppData\Local\5C54w\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\5C54w\WTSAPI32.dllFilesize
995KB
MD530ad6c6497f45df4b988c15491a53f82
SHA19d6a77ebc586b80fdaf6756d3ba11b2463103e6a
SHA25640a381bb7d5a8a7cc307a2b0f2463e0f49ad80d56c8bb9fa1b65d4a633d6efcc
SHA5124285cbfe7d7b0b5cbce8f0bc3cda4dc73315f25b9533ff76343cf47b523297a23407b5040e7d732744911105d55a0e0ec5c24cf5fff6805617e32c8e8a770d37
-
C:\Users\Admin\AppData\Local\D0qH\WINMM.dllFilesize
998KB
MD5de3a93a16b56db39c9bffcf9de11ae05
SHA1cc25b8c1c3bd3d5a38011dedac366f6da7014c00
SHA256dfc95a40df9730e96f6c223ad82a6f4a6befaf227a85c0e3cf29aa811137be7f
SHA512468782e89f55a9ff83093debd5d227eecff10170c525e29b1c7924bf440f7c6a739368437de44bbb2c61941e767b6bb8ca25dda75dfea4b1365dc329140da6f4
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Mewsro.lnkFilesize
1KB
MD59d5259675d3ce5509b1a6c38232e178f
SHA155516a610a7c6398e9251f15ad819451e7d40b9a
SHA2567015906a31f9b0de000689e3700edd04f634bbabccb0be526c76dd07ec4afc5b
SHA512e5ef093c2921899cfc7af146befeee03cd3d9dc4e686f340f17ae6ff2655d00b3bdab67de5ee6c23af702cce3ca4e72a3e5022338ee4c937aa935cc35fdf0953
-
\Users\Admin\AppData\Local\5C54w\EhStorAuthn.exeFilesize
137KB
MD53abe95d92c80dc79707d8e168d79a994
SHA164b10c17f602d3f21c84954541e7092bc55bb5ab
SHA2562159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad
SHA51270fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c
-
\Users\Admin\AppData\Local\D0qH\PresentationSettings.exeFilesize
172KB
MD5a6f8d318f6041334889481b472000081
SHA1b8cf08ec17b30c8811f2514246fcdff62731dd58
SHA256208b94fd66a6ce266c3195f87029a41a0622fff47f2a5112552cb087adbb1258
SHA51260f70fa8a19e6ea6f08f4907dd7fede3665ad3f2e013d49f6649442ea5871a967b9a53ec4d3328a06cb83b69be1b7af1bb14bf122b568bd1f8432ee1d0bfee69
-
\Users\Admin\AppData\Local\ehTv\AdapterTroubleshooter.exeFilesize
39KB
MD5d4170c9ff5b2f85b0ce0246033d26919
SHA1a76118e8775e16237cf00f2fb79718be0dc84db1
SHA256d05e010a2570cdd5a67f62c99483aeeecb6a8d5ecc523cd49b158a460c9be5da
SHA5129c85a9ea4002bd55cf9c51e470dd1bec527ff04b5d0d6f83094a998c541416cd47c9f42c6ca7e35ffa2842877f79e3c2e989489b9bf81644c5c57bb406b89608
-
\Users\Admin\AppData\Local\ehTv\d3d9.dllFilesize
994KB
MD5075f2cbb187d53ee5859bbed2fd72cd3
SHA12a9a2d1a40ea3dfa43d975d52b02fa352ddf404f
SHA256c630da84e1585c5a3b2bfedd1125802658a796a23250e7d966bbac63b8315db7
SHA512ab04ec3965cb4812b750220f916f82c96881398991cdd80a3b06f978e36cfa3f46a191223f3325ab33da9d80b0027d768dcebd7072c0008d7a9d2632b47082c4
-
memory/1188-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-24-0x0000000002550000-0x0000000002557000-memory.dmpFilesize
28KB
-
memory/1188-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-29-0x00000000778D0000-0x00000000778D2000-memory.dmpFilesize
8KB
-
memory/1188-28-0x0000000077741000-0x0000000077742000-memory.dmpFilesize
4KB
-
memory/1188-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-4-0x0000000077536000-0x0000000077537000-memory.dmpFilesize
4KB
-
memory/1188-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-5-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/1188-72-0x0000000077536000-0x0000000077537000-memory.dmpFilesize
4KB
-
memory/1188-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1976-69-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1976-73-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1976-76-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2560-57-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2560-52-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2992-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2992-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2992-3-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/3048-91-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/3048-94-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB