Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
2a3eadb5b49e55c1d57f5fea6961bb2e_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
2a3eadb5b49e55c1d57f5fea6961bb2e_JaffaCakes118.dll
-
Size
993KB
-
MD5
2a3eadb5b49e55c1d57f5fea6961bb2e
-
SHA1
de9bedff2a89a1668e5eb6054170522f5a373ba8
-
SHA256
74cd2d4fa0961ef49cd9c03e280ba2b224d948f51f7c56d75592771ff1585cf6
-
SHA512
beb1d186d80c5edce4f9c4db3ce524dc69724ecea929912c4bbfa85adda23e93538bba6fd66473f425d3868817e795287476c33d726064f1da2fc407561c28fa
-
SSDEEP
24576:rVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:rV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1356-5-0x00000000029A0000-0x00000000029A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rrinstaller.exeBitLockerWizard.exedwm.exepid process 2456 rrinstaller.exe 2472 BitLockerWizard.exe 1272 dwm.exe -
Loads dropped DLL 7 IoCs
Processes:
rrinstaller.exeBitLockerWizard.exedwm.exepid process 1356 2456 rrinstaller.exe 1356 2472 BitLockerWizard.exe 1356 1272 dwm.exe 1356 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Groztcac = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CTLs\\Orm\\BitLockerWizard.exe" -
Processes:
BitLockerWizard.exedwm.exerundll32.exerrinstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2328 rundll32.exe 2328 rundll32.exe 2328 rundll32.exe 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1356 wrote to memory of 2540 1356 rrinstaller.exe PID 1356 wrote to memory of 2540 1356 rrinstaller.exe PID 1356 wrote to memory of 2540 1356 rrinstaller.exe PID 1356 wrote to memory of 2456 1356 rrinstaller.exe PID 1356 wrote to memory of 2456 1356 rrinstaller.exe PID 1356 wrote to memory of 2456 1356 rrinstaller.exe PID 1356 wrote to memory of 2500 1356 BitLockerWizard.exe PID 1356 wrote to memory of 2500 1356 BitLockerWizard.exe PID 1356 wrote to memory of 2500 1356 BitLockerWizard.exe PID 1356 wrote to memory of 2472 1356 BitLockerWizard.exe PID 1356 wrote to memory of 2472 1356 BitLockerWizard.exe PID 1356 wrote to memory of 2472 1356 BitLockerWizard.exe PID 1356 wrote to memory of 1208 1356 dwm.exe PID 1356 wrote to memory of 1208 1356 dwm.exe PID 1356 wrote to memory of 1208 1356 dwm.exe PID 1356 wrote to memory of 1272 1356 dwm.exe PID 1356 wrote to memory of 1272 1356 dwm.exe PID 1356 wrote to memory of 1272 1356 dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a3eadb5b49e55c1d57f5fea6961bb2e_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵
-
C:\Users\Admin\AppData\Local\gnbE\rrinstaller.exeC:\Users\Admin\AppData\Local\gnbE\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\VQeuuH\BitLockerWizard.exeC:\Users\Admin\AppData\Local\VQeuuH\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵
-
C:\Users\Admin\AppData\Local\V6feIL0A\dwm.exeC:\Users\Admin\AppData\Local\V6feIL0A\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\V6feIL0A\UxTheme.dllFilesize
995KB
MD5963f63aaecd57b734bcda916fe522c0a
SHA1ef7ba64588e34969612c1986454e91ceee537052
SHA2560571ef949e4675d474e06bc4ae30ca2e36299b53fa3ce81bac5ab88c3a48cf1c
SHA512e16489f8b3d2b297928628f0d2cac78e79108c0d4e2d3dbaa64fec195dfe12666135b2c7e60f2870f85064a100092d65e57574e279b41cc86fd9f0145cb8d3c5
-
C:\Users\Admin\AppData\Local\VQeuuH\FVEWIZ.dllFilesize
995KB
MD5fe27615486d93dbde00ba4dc22905148
SHA1b65052cffae870c3044db1ae854ce6d5d12a4112
SHA256df7b78e85e0c5d1ccbb176514a0876fe1f65dc5e5b6230b6e06be60c9d0224b4
SHA5128a8db5aaa09c8b985ca6b9bcfc65457d412c361482cc4b089661d689ed16d8904efa51c79cbe462a6f4fdc73ecc2a4a2945eac982ce37cce04ace46c163762a3
-
C:\Users\Admin\AppData\Local\gnbE\MFPlat.DLLFilesize
998KB
MD5cbe8807bf819c63a02e9b59d0d253571
SHA1c0ad91178d38e47f8e10b26f50d225c28646fc36
SHA2566bb2faae746290d89ca7cf398512e1098c4fd4a72d53cb9e856ffea56953cb50
SHA512968b9dafb663033564670e5c80d8f8b28458ebb8f143f46f02105eb506036fa98980d53df754a57721085cc79c943ead4dada40dfe9570c7cbae78f1cb9e48dc
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Aqrvnhd.lnkFilesize
1KB
MD5a07a4ff2179396cdf14a87ad375ef412
SHA13e68b9f0c201ba30b1acc84b019fc0268eb36cdb
SHA256bfd6dd4dcda73f92caf9db974bdbbfe152b7974bed770911d1f498c59ecc9fff
SHA5124625a84650af3a66dc3cd8c592972162958eed2061d4e1a4a03dfe84225811fca8766787fde00987efda1d457a33e08ad8f7113338c33b80d74bf32b3d4956fa
-
\Users\Admin\AppData\Local\V6feIL0A\dwm.exeFilesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
\Users\Admin\AppData\Local\VQeuuH\BitLockerWizard.exeFilesize
98KB
MD508a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
\Users\Admin\AppData\Local\gnbE\rrinstaller.exeFilesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
memory/1272-93-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1356-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-37-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-23-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-28-0x0000000077720000-0x0000000077722000-memory.dmpFilesize
8KB
-
memory/1356-27-0x0000000077591000-0x0000000077592000-memory.dmpFilesize
4KB
-
memory/1356-14-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-24-0x0000000002980000-0x0000000002987000-memory.dmpFilesize
28KB
-
memory/1356-36-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-73-0x0000000077486000-0x0000000077487000-memory.dmpFilesize
4KB
-
memory/1356-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-5-0x00000000029A0000-0x00000000029A1000-memory.dmpFilesize
4KB
-
memory/1356-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1356-4-0x0000000077486000-0x0000000077487000-memory.dmpFilesize
4KB
-
memory/1356-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2328-0-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2328-3-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2328-44-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2456-52-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2456-58-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2456-55-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/2472-77-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2472-74-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2472-70-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB