Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
0e60f420fdf85dd1b7fbaea84e647693_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
0e60f420fdf85dd1b7fbaea84e647693_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
0e60f420fdf85dd1b7fbaea84e647693
-
SHA1
e8aabce04be2e42aaf0235e7ab5f2b354ea727bb
-
SHA256
fb7040dce4fffb1394723ad25f6c9d088db9340cd2aed96b972f476693788f9a
-
SHA512
505fca3bcc20f0a9c16e566cccb6a8d1ab1949d7f5f4dd10bbf019e99b119d57947245b6a3dfe779c63636b4dfceaaf83a49efa40f832d57515097e6fca3cb4c
-
SSDEEP
24576:SuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:69cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1212-5-0x0000000002B00000-0x0000000002B01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SndVol.exeMagnify.exeBitLockerWizardElev.exepid process 1984 SndVol.exe 1884 Magnify.exe 1136 BitLockerWizardElev.exe -
Loads dropped DLL 7 IoCs
Processes:
SndVol.exeMagnify.exeBitLockerWizardElev.exepid process 1212 1984 SndVol.exe 1212 1884 Magnify.exe 1212 1136 BitLockerWizardElev.exe 1212 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\EVQRBS~1\\Magnify.exe" -
Processes:
rundll32.exeSndVol.exeMagnify.exeBitLockerWizardElev.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2220 rundll32.exe 2220 rundll32.exe 2220 rundll32.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1212 Token: SeShutdownPrivilege 1212 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1212 wrote to memory of 2004 1212 SndVol.exe PID 1212 wrote to memory of 2004 1212 SndVol.exe PID 1212 wrote to memory of 2004 1212 SndVol.exe PID 1212 wrote to memory of 1984 1212 SndVol.exe PID 1212 wrote to memory of 1984 1212 SndVol.exe PID 1212 wrote to memory of 1984 1212 SndVol.exe PID 1212 wrote to memory of 840 1212 Magnify.exe PID 1212 wrote to memory of 840 1212 Magnify.exe PID 1212 wrote to memory of 840 1212 Magnify.exe PID 1212 wrote to memory of 1884 1212 Magnify.exe PID 1212 wrote to memory of 1884 1212 Magnify.exe PID 1212 wrote to memory of 1884 1212 Magnify.exe PID 1212 wrote to memory of 2476 1212 BitLockerWizardElev.exe PID 1212 wrote to memory of 2476 1212 BitLockerWizardElev.exe PID 1212 wrote to memory of 2476 1212 BitLockerWizardElev.exe PID 1212 wrote to memory of 1136 1212 BitLockerWizardElev.exe PID 1212 wrote to memory of 1136 1212 BitLockerWizardElev.exe PID 1212 wrote to memory of 1136 1212 BitLockerWizardElev.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e60f420fdf85dd1b7fbaea84e647693_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:2004
-
C:\Users\Admin\AppData\Local\NtKONO\SndVol.exeC:\Users\Admin\AppData\Local\NtKONO\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1984
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:840
-
C:\Users\Admin\AppData\Local\qu8Z\Magnify.exeC:\Users\Admin\AppData\Local\qu8Z\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1884
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵PID:2476
-
C:\Users\Admin\AppData\Local\9yqTuaMZ\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\9yqTuaMZ\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56d7bc39139f3a7244f783520618b7c8c
SHA1a2457114a0f2ba2a1426467b95c68636282b3ba1
SHA2567956303c3c5a1531a6ca2feeaaa06744a2263e8343c07b22db2be00aba3e3956
SHA512df20ceddb6287c3e08b4daf2ceb415ed56695ca8c05f2afeb7f3900601d2bc4f3423528940c8132cc021e7ca998770f0fc390d15b314d1b4f4b6ea314cef9aaa
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
Filesize
637KB
MD5233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
Filesize
1.2MB
MD525b6e94ce7cfd7226046675dd81e9359
SHA1074ba199645d5579ee424ba9237174b3e5321ce9
SHA2568d16862aa47df83e8fb3a1d0753e962bba1378e386af686a85bf7db3b4b2cac4
SHA512072a1ddfb855adbb7b72a83f701f0853699095f2faf384aafa233ae0cd997e4aaa304f960bff1c4c0af644fad6c8f6a89a928ebee9056977dad7823d92d44ff4
-
Filesize
1KB
MD544c479a408952380c8e8f938ab25e445
SHA1f3ca729df5bfd33fee059b5b2ee5d7b877ba3d93
SHA25602088ccf1d80d555920edee84f8a84454845fd15f318c76c0ad4269993ffcf92
SHA5125551816ac4f04fd4b8ffb30a3cb582fb4e749069c61a314ce54b1bcffc8e0b36305ca6860e049b55931b523661c594e8fcb240e75c0b32d66ea9c6840805b932
-
Filesize
98KB
MD573f13d791e36d3486743244f16875239
SHA1ed5ec55dbc6b3bda505f0a4c699c257c90c02020
SHA2562483d2f0ad481005cca081a86a07be9060bc6d4769c4570f92ad96fa325be9b8
SHA512911a7b532312d50cc5e7f6a046d46ab5b322aa17ce59a40477173ea50f000a95db45f169f4ea3574e3e00ae4234b9f8363ac79329d683c14ebee1d423e6e43af
-
Filesize
1.2MB
MD50c3266ccab4a975c301e3aa56f8cbc26
SHA1cfdd61819ba489c261b53af4e98bf9ea04c70843
SHA25605e3ed2bf8034e587ee45b2732b32e8cbf8e4c14a832a85e9a091d521aabeed7
SHA512d158d5f7214f327c68fff007c44472fc42d153ee3acb8efa20f5215fa78ec855769d580ce0d854a2a6ee58378163e5891efc78384674f7b611bbad0fd2cec73c