Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
004b51e805c513d678b7627d4ebc63ce_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
004b51e805c513d678b7627d4ebc63ce_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
004b51e805c513d678b7627d4ebc63ce
-
SHA1
3ef5481b3e3090f633de2915a04e45dcd129d560
-
SHA256
008b899a2dc53b0bdaa123e4fc83e7df7594098cc179624bfdafedafcdcd135e
-
SHA512
8657cfd745d7b1a7694747a43affb27e12a025576986eceac6bae5e23526c5f5446b6ec58ef059e97a50ae5ed497fe46779915adc68b0d8a92d27f2e84351577
-
SSDEEP
24576:WVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:WV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002AD0000-0x0000000002AD1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WindowsAnytimeUpgradeResults.exeBitLockerWizard.exeMpSigStub.exepid process 584 WindowsAnytimeUpgradeResults.exe 1860 BitLockerWizard.exe 1240 MpSigStub.exe -
Loads dropped DLL 7 IoCs
Processes:
WindowsAnytimeUpgradeResults.exeBitLockerWizard.exeMpSigStub.exepid process 1192 584 WindowsAnytimeUpgradeResults.exe 1192 1860 BitLockerWizard.exe 1192 1240 MpSigStub.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\9.0\\Collab\\Y9lJzbaO\\BitLockerWizard.exe" -
Processes:
rundll32.exeWindowsAnytimeUpgradeResults.exeBitLockerWizard.exeMpSigStub.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MpSigStub.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 1036 1192 WindowsAnytimeUpgradeResults.exe PID 1192 wrote to memory of 1036 1192 WindowsAnytimeUpgradeResults.exe PID 1192 wrote to memory of 1036 1192 WindowsAnytimeUpgradeResults.exe PID 1192 wrote to memory of 584 1192 WindowsAnytimeUpgradeResults.exe PID 1192 wrote to memory of 584 1192 WindowsAnytimeUpgradeResults.exe PID 1192 wrote to memory of 584 1192 WindowsAnytimeUpgradeResults.exe PID 1192 wrote to memory of 1788 1192 BitLockerWizard.exe PID 1192 wrote to memory of 1788 1192 BitLockerWizard.exe PID 1192 wrote to memory of 1788 1192 BitLockerWizard.exe PID 1192 wrote to memory of 1860 1192 BitLockerWizard.exe PID 1192 wrote to memory of 1860 1192 BitLockerWizard.exe PID 1192 wrote to memory of 1860 1192 BitLockerWizard.exe PID 1192 wrote to memory of 2308 1192 MpSigStub.exe PID 1192 wrote to memory of 2308 1192 MpSigStub.exe PID 1192 wrote to memory of 2308 1192 MpSigStub.exe PID 1192 wrote to memory of 1240 1192 MpSigStub.exe PID 1192 wrote to memory of 1240 1192 MpSigStub.exe PID 1192 wrote to memory of 1240 1192 MpSigStub.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\004b51e805c513d678b7627d4ebc63ce_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵PID:1036
-
C:\Users\Admin\AppData\Local\hdzlRrDM\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\hdzlRrDM\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:584
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:1788
-
C:\Users\Admin\AppData\Local\wRkbGPT2p\BitLockerWizard.exeC:\Users\Admin\AppData\Local\wRkbGPT2p\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1860
-
C:\Windows\system32\MpSigStub.exeC:\Windows\system32\MpSigStub.exe1⤵PID:2308
-
C:\Users\Admin\AppData\Local\ul0wqnHO\MpSigStub.exeC:\Users\Admin\AppData\Local\ul0wqnHO\MpSigStub.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5e045805fa0de649721204f43064238cd
SHA1cd623ef40511abc521e53b3beed1e19a750a48eb
SHA256d70ddfe3cf0bda9753469c9382a8d550832295c9703a13ee83971991d9d6a5c3
SHA5129db35185dfe60abdd106b4ead8ff53f93d120aaaf55ca9d533f9800a61f489f58c823b061da0abb672d166863cde96c3557ca434d17dc901b56e82af0f4a5e6b
-
Filesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e
-
Filesize
1.2MB
MD5e715cd172f91ad213528dd45696e11f9
SHA125618520d94556e19aee60564cfcb0ddc2cb2482
SHA2560b105f58ea494a2f03e759fd2adf22306744b7c0bfe1997808a8975c3a440d51
SHA51222867094d665b81d4e38ab06f38a0b47df11d3f91d5fa3c4aa24fd7974db6c557ebf7f03e237ec5cfa6296a1dad950eecdcaba837eefc94a21bfdc52ddda807b
-
Filesize
98KB
MD508a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
Filesize
1.2MB
MD52a2555b1e8d0ea4c057b1fe49dacd443
SHA1689f03b45b772fdef921e2739f62ff1ec1b4555b
SHA256158a412c7177a2ab3c1adce5b6a050c928ae3d430cea59d8b66b5427f5f57d45
SHA512ad00ad6f6d415a653f6962695bab300021b46a965645fc56b82e61239d410b01124fb58f1abd63563b6c65abb497ef35d477e0d1c3a158687b491e122343d321
-
Filesize
1KB
MD5fd3322912f92f7f904cdf1c85b5fb7de
SHA1657d6571cdbf462aa6de59dba6afb81c7d5e938f
SHA2569ab8963f0a071fcffbb66525b2baa9d12eefc3a013330b7424614b22b6683c23
SHA51207be214dbf8eaeffc3a0276013842f363744b1ad675a96136353117d0f05b477d38f58473b8817a6d42fdda0c7c68edb919cf6e3a630c93909d6781d11e54113
-
Filesize
264KB
MD52e6bd16aa62e5e95c7b256b10d637f8f
SHA1350be084477b1fe581af83ca79eb58d4defe260f
SHA256d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3
SHA5121f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542