Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
6460847e42c5eabeb93e67fece6128f7_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
6460847e42c5eabeb93e67fece6128f7_JaffaCakes118.dll
-
Size
990KB
-
MD5
6460847e42c5eabeb93e67fece6128f7
-
SHA1
196bd51b56ce2588c0a91e164585f34e0939c4d7
-
SHA256
297c7231333dfd8841dd8c37626db80a13c92a61552feb5a8891cceddd5699c2
-
SHA512
2d169daa0f73627fe19d537389497e6b5c98fb0dedfb28851a72fcaaaf5525662b5a5cdf85d7f92f72ad287f7eaf3e167363c4a132e52439e5ce808009636bd2
-
SSDEEP
24576:hVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:hV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1188-5-0x0000000002550000-0x0000000002551000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2500 dwm.exe 1800 fveprompt.exe 2376 BitLockerWizardElev.exe -
Loads dropped DLL 7 IoCs
pid Process 1188 Process not Found 2500 dwm.exe 1188 Process not Found 1800 fveprompt.exe 1188 Process not Found 2376 BitLockerWizardElev.exe 1188 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\sWA2NiS\\fveprompt.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2664 1188 Process not Found 28 PID 1188 wrote to memory of 2664 1188 Process not Found 28 PID 1188 wrote to memory of 2664 1188 Process not Found 28 PID 1188 wrote to memory of 2500 1188 Process not Found 29 PID 1188 wrote to memory of 2500 1188 Process not Found 29 PID 1188 wrote to memory of 2500 1188 Process not Found 29 PID 1188 wrote to memory of 1324 1188 Process not Found 30 PID 1188 wrote to memory of 1324 1188 Process not Found 30 PID 1188 wrote to memory of 1324 1188 Process not Found 30 PID 1188 wrote to memory of 1800 1188 Process not Found 31 PID 1188 wrote to memory of 1800 1188 Process not Found 31 PID 1188 wrote to memory of 1800 1188 Process not Found 31 PID 1188 wrote to memory of 1836 1188 Process not Found 32 PID 1188 wrote to memory of 1836 1188 Process not Found 32 PID 1188 wrote to memory of 1836 1188 Process not Found 32 PID 1188 wrote to memory of 2376 1188 Process not Found 33 PID 1188 wrote to memory of 2376 1188 Process not Found 33 PID 1188 wrote to memory of 2376 1188 Process not Found 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6460847e42c5eabeb93e67fece6128f7_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:2664
-
C:\Users\Admin\AppData\Local\NiH7\dwm.exeC:\Users\Admin\AppData\Local\NiH7\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2500
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵PID:1324
-
C:\Users\Admin\AppData\Local\eaenLR\fveprompt.exeC:\Users\Admin\AppData\Local\eaenLR\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1800
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵PID:1836
-
C:\Users\Admin\AppData\Local\9oQtQO\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\9oQtQO\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
992KB
MD57c907bf7678f96c049b3096d138c5270
SHA13546b0f2e890a29ed57e09f02992979048223fdc
SHA2562e1b2df37dcfcd728fd7c9640fb2c13d71dee39df647f87e0a9fe7de6b323279
SHA512e64107e3c22b69b478e5c779c9e0e73114acbf55d62bc76b9d446d5d8075b3c6f8a2e81e3e292273369c543ba201b161e1e6347fae08bce584f8b67300d99f5d
-
Filesize
993KB
MD57518351b0ed7c98bd68ea7fdde0bce38
SHA1891a873b818fea98f40a24d9e45172355b00241c
SHA25632f6a7ee2b03ac6e871d2456c305de80ce6ec6eb172de9a1306499ba8c42f3b6
SHA5128ad3ab2c6e88293485d19b5e4ba4c4cc4bfc0acb79534dd8772a87edea2bd593c31645323891d91d8db93cbd265f8cdca4c153420e09e8fb2ace7f919c12db5d
-
Filesize
992KB
MD55831e474979b007d8f92590eb184d949
SHA1a3c00574c827625db577dbecf666d25b6a3e6427
SHA25683a6f464134f4b28ac3720749de15814e725cd6ca15112a6bb741979c0a0428f
SHA51231b7be3abfcfabe5051b132f5734e5e404284f88f071a2d45a037f0cca0b7ea0bcf076d41455cdeffe82d00fcc59ef5dbb4b69cd3768c963537059c1d5a86b7b
-
Filesize
1KB
MD52cda9cc787cf91474be69ef972646c36
SHA1013b37d71cb329ab886f2271c09ef7eb2fd3b9ca
SHA2567f262bdf09cfc9b755a5ff62c4d23943cc5adc4c8bf536229afa23f9d7677810
SHA5126c65550f35437d07aebffa4ef5e0ec91dba888f397727b4aae0108d248c9e8fadab1e4c3695f9b985dedbbeadbd255de412d72d1e6331e4bc4a22b9e1f458fd0
-
Filesize
98KB
MD573f13d791e36d3486743244f16875239
SHA1ed5ec55dbc6b3bda505f0a4c699c257c90c02020
SHA2562483d2f0ad481005cca081a86a07be9060bc6d4769c4570f92ad96fa325be9b8
SHA512911a7b532312d50cc5e7f6a046d46ab5b322aa17ce59a40477173ea50f000a95db45f169f4ea3574e3e00ae4234b9f8363ac79329d683c14ebee1d423e6e43af
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
Filesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc