Analysis
-
max time kernel
149s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
1eeb67c0b2313b3e4bc8acd49939c136_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
1eeb67c0b2313b3e4bc8acd49939c136_JaffaCakes118.dll
-
Size
986KB
-
MD5
1eeb67c0b2313b3e4bc8acd49939c136
-
SHA1
e94a3953ad29be223a423514e0fe230c65999e04
-
SHA256
bcaa8df8f923d15444b1f1e63808c8b39ca0ac30d6c1288c294b5273f1a95387
-
SHA512
b57a8252fd821cad9ea48f431ceb20da7a6be24530459096a5998e7cb16559372fd8942e54a64ebadd58e2765e843024e808bfe32eec5897c42c92caaa9e1533
-
SSDEEP
24576:+VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:+V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3448-4-0x00000000023B0000-0x00000000023B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
BitLockerWizard.exelpksetup.exerdpclip.exepid process 4956 BitLockerWizard.exe 4944 lpksetup.exe 4856 rdpclip.exe -
Loads dropped DLL 3 IoCs
Processes:
BitLockerWizard.exelpksetup.exerdpclip.exepid process 4956 BitLockerWizard.exe 4944 lpksetup.exe 4856 rdpclip.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wuaobpzp = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\HVnu\\lpksetup.exe" -
Processes:
BitLockerWizard.exelpksetup.exerdpclip.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 4032 regsvr32.exe 4032 regsvr32.exe 4032 regsvr32.exe 4032 regsvr32.exe 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3448 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3448 wrote to memory of 2492 3448 BitLockerWizard.exe PID 3448 wrote to memory of 2492 3448 BitLockerWizard.exe PID 3448 wrote to memory of 4956 3448 BitLockerWizard.exe PID 3448 wrote to memory of 4956 3448 BitLockerWizard.exe PID 3448 wrote to memory of 1184 3448 lpksetup.exe PID 3448 wrote to memory of 1184 3448 lpksetup.exe PID 3448 wrote to memory of 4944 3448 lpksetup.exe PID 3448 wrote to memory of 4944 3448 lpksetup.exe PID 3448 wrote to memory of 3984 3448 rdpclip.exe PID 3448 wrote to memory of 3984 3448 rdpclip.exe PID 3448 wrote to memory of 4856 3448 rdpclip.exe PID 3448 wrote to memory of 4856 3448 rdpclip.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1eeb67c0b2313b3e4bc8acd49939c136_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\3iy\BitLockerWizard.exeC:\Users\Admin\AppData\Local\3iy\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵
-
C:\Users\Admin\AppData\Local\L9gJ\lpksetup.exeC:\Users\Admin\AppData\Local\L9gJ\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵
-
C:\Users\Admin\AppData\Local\IFD\rdpclip.exeC:\Users\Admin\AppData\Local\IFD\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\3iy\BitLockerWizard.exeFilesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
C:\Users\Admin\AppData\Local\3iy\FVEWIZ.dllFilesize
988KB
MD5d60aaa18141ebdb8f9dde7758a2cc8ec
SHA1bb556a52354ba8256309ba070516862eb7bc180a
SHA25637a3f3091065baffd5c3d7a1d56095ba3eeaee14563bab86daa935ac661045d8
SHA51276de30f6b79c7326050eb77f3a005665243b2294200b25de6dc88f980ebeebd95e2d3d57f762ecbd5c6bd8aaa2caaba63d8fcdd46572452b2ffe0a6e2c1ba118
-
C:\Users\Admin\AppData\Local\IFD\WTSAPI32.dllFilesize
988KB
MD5bf137a13a73139ef133ce5a2ecd289c0
SHA1956076ff8bdc79f15f72bd119f04ea8eab9224b3
SHA256ecb1587e2d4761ae95a7fee3cce5fb4deb62cf30d7ffdd28fb3485686cfdbf88
SHA5124b73233a9609974f899bbed5d9c2853a0847f0dd610c39c25dc9925d30fd73d1c0079b06910a8897c182095393135af95ce64540e75a17c84304806b28969685
-
C:\Users\Admin\AppData\Local\IFD\rdpclip.exeFilesize
446KB
MD5a52402d6bd4e20a519a2eeec53332752
SHA1129f2b6409395ef877b9ca39dd819a2703946a73
SHA2569d5be181d9309dea98039d2ce619afe745fc8a9a1b1c05cf860b3620b5203308
SHA512632dda67066cff2b940f27e3f409e164684994a02bda57d74e958c462b9a0963e922be4a487c06126cecc9ef34d34913ef8315524bf8422f83c0c135b8af924e
-
C:\Users\Admin\AppData\Local\L9gJ\dpx.dllFilesize
986KB
MD59609e97f6263bedbd2d9e28fdc266259
SHA18ba5568149a6274e87de38c683871e146e93725e
SHA256226a381572a4c569c48e57615719a9a4ed364e80d9e6828b3eb3d12223833c32
SHA512c4877c058438413e31f618a2c98c2267e21da756818368de16a9510b8c4897c927af6ea89fce278b191583ed094d86d38fbf6c17c9d6b77e6be724a2e7e8d101
-
C:\Users\Admin\AppData\Local\L9gJ\lpksetup.exeFilesize
728KB
MD5c75516a32e0aea02a184074d55d1a997
SHA1f9396946c078f8b0f28e3a6e21a97eeece31d13f
SHA256cb3cbeaaff7c07b044f70177e2899a87e80840d177238eb7dd25b8d9e20bef22
SHA51292994fdb75b15742e33e6d7a499664b722e45b9c160d8cc42d30bc727044063d589f45853692b5b754df6ff0fd21294dc32fed985b153f93f4bcf9f8c89a5bcc
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Aibqacvbwgcfz.lnkFilesize
1KB
MD5c4338ffcab4ec18958be19837e2bd296
SHA1c7f8ef7dab375e8bb871d73f01b1cdb33ab2bc92
SHA256f889c6bec26e7c24b0c428b56800f8a10949c0db2c7b81289a9704a8b3b86a91
SHA5122fa6f3888d4aec40139d796607016ffdac308d039b6a5b1193194c6e8dddd82a9ffaa13e7786130b6fc2897bf4f42340cc25a92b7a4338235b346c27b245e896
-
memory/3448-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-33-0x0000000002370000-0x0000000002377000-memory.dmpFilesize
28KB
-
memory/3448-32-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-4-0x00000000023B0000-0x00000000023B1000-memory.dmpFilesize
4KB
-
memory/3448-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-6-0x00007FF81FC6A000-0x00007FF81FC6B000-memory.dmpFilesize
4KB
-
memory/3448-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-36-0x00007FF8219F0000-0x00007FF821A00000-memory.dmpFilesize
64KB
-
memory/3448-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3448-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4032-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4032-0-0x00000000021F0000-0x00000000021F7000-memory.dmpFilesize
28KB
-
memory/4032-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/4856-83-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4944-64-0x000002D847280000-0x000002D847287000-memory.dmpFilesize
28KB
-
memory/4944-67-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4956-50-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4956-44-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/4956-47-0x00000158CA870000-0x00000158CA877000-memory.dmpFilesize
28KB