Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 08:16
Static task
static1
Behavioral task
behavioral1
Sample
6a5077d2335c8edc593dcc30bd3568cb_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
6a5077d2335c8edc593dcc30bd3568cb_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
6a5077d2335c8edc593dcc30bd3568cb
-
SHA1
e7ab0416dfc603b1d26bad55ca03d7644035cef7
-
SHA256
81f6d587116c671a4cdd471958be34ae4d7139d6cc8391630b1ea5f904fb3a82
-
SHA512
acb915f6ea62c9ea7a9c709d5ec55eea6ade1602b49153f93f64640579c787a8e54a8eb4ca2fb00fc9f2be019c619ca411510069ac59594007fededce708cab6
-
SSDEEP
24576:cuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:U9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1188-5-0x0000000002550000-0x0000000002551000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
xpsrchvw.exeBitLockerWizardElev.exedpapimig.exepid process 2532 xpsrchvw.exe 2808 BitLockerWizardElev.exe 1356 dpapimig.exe -
Loads dropped DLL 7 IoCs
Processes:
xpsrchvw.exeBitLockerWizardElev.exedpapimig.exepid process 1188 2532 xpsrchvw.exe 1188 2808 BitLockerWizardElev.exe 1188 1356 dpapimig.exe 1188 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\Q6iqZ5t\\BitLockerWizardElev.exe" -
Processes:
rundll32.exexpsrchvw.exeBitLockerWizardElev.exedpapimig.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1648 rundll32.exe 1648 rundll32.exe 1648 rundll32.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1188 wrote to memory of 2484 1188 xpsrchvw.exe PID 1188 wrote to memory of 2484 1188 xpsrchvw.exe PID 1188 wrote to memory of 2484 1188 xpsrchvw.exe PID 1188 wrote to memory of 2532 1188 xpsrchvw.exe PID 1188 wrote to memory of 2532 1188 xpsrchvw.exe PID 1188 wrote to memory of 2532 1188 xpsrchvw.exe PID 1188 wrote to memory of 2476 1188 BitLockerWizardElev.exe PID 1188 wrote to memory of 2476 1188 BitLockerWizardElev.exe PID 1188 wrote to memory of 2476 1188 BitLockerWizardElev.exe PID 1188 wrote to memory of 2808 1188 BitLockerWizardElev.exe PID 1188 wrote to memory of 2808 1188 BitLockerWizardElev.exe PID 1188 wrote to memory of 2808 1188 BitLockerWizardElev.exe PID 1188 wrote to memory of 1248 1188 dpapimig.exe PID 1188 wrote to memory of 1248 1188 dpapimig.exe PID 1188 wrote to memory of 1248 1188 dpapimig.exe PID 1188 wrote to memory of 1356 1188 dpapimig.exe PID 1188 wrote to memory of 1356 1188 dpapimig.exe PID 1188 wrote to memory of 1356 1188 dpapimig.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a5077d2335c8edc593dcc30bd3568cb_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵
-
C:\Users\Admin\AppData\Local\Dxt\xpsrchvw.exeC:\Users\Admin\AppData\Local\Dxt\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵
-
C:\Users\Admin\AppData\Local\d3L\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\d3L\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵
-
C:\Users\Admin\AppData\Local\FDQ45\dpapimig.exeC:\Users\Admin\AppData\Local\FDQ45\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Dxt\WINMM.dllFilesize
1.2MB
MD581ca6de13f753ca3404f335b83ec8560
SHA12114d3f3ed79b6aecc6abe167bf9af523a5647b9
SHA256a52ab51185b2032a50214357466118d51052980b32c1f1eb011751a8a5defe18
SHA5128640ae124728582016594ca7d42e4b3e41300a142675f5446c6932c4f9d10aece5f251e78a84033c5fde50ca0d5a05c5fc7a13b72facb1c3182adf761ba2654b
-
C:\Users\Admin\AppData\Local\Dxt\xpsrchvw.exeFilesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
C:\Users\Admin\AppData\Local\FDQ45\DUI70.dllFilesize
1.4MB
MD53418bcb04dfd3a2ce999ca850899fc3e
SHA184979bc066ae669379061bed119aa33ea97d260c
SHA256ebf4dea3b76a48307cb58741e36937d741b08305af077ac2193bd3d9724dbe99
SHA512665191202f65bd06d472708d6716d21eaa88528b222ca01b7fb7d8a9697a8cb1ebe7079d54958ea21030b7f050eb0565bac92fbfd9c88cbe2004926d1da691ea
-
C:\Users\Admin\AppData\Local\FDQ45\dpapimig.exeFilesize
73KB
MD50e8b8abea4e23ddc9a70614f3f651303
SHA16d332ba4e7a78039f75b211845514ab35ab467b2
SHA25666fc6b68e54b8840a38b4de980cc22aed21009afc1494a9cc68e892329f076a1
SHA5124feded78f9b953472266693e0943030d00f82a5cc8559df60ae0479de281164155e19687afc67cba74d04bb9ad092f5c7732f2d2f9b06274ca2ae87dc2d4a6dc
-
C:\Users\Admin\AppData\Local\d3L\FVEWIZ.dllFilesize
1.2MB
MD5339204e24f08b234cba995210bbd24aa
SHA19683d8d1b2e90004956c97e00cc4448bfdb9d65b
SHA256484fed115efed56cca0c9c5863e07dfcd40e8534e527574e685d4e996104cc67
SHA51227d63e84a95f0606513c9bf25c00dc5f913992e47e03b6e8b021bcedb7955af6256badfb9c28f2974f3e608ac0e47360fc8b5c6faf92514be28a5cc1e39646f6
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Pclfpjzoauil.lnkFilesize
1KB
MD5c2eaef7a89244c1c613758a4fb78b15a
SHA1902e5420eeff45eb5f08a3e647bc8469979a7a03
SHA25603486edc224b0bd383c694c6b0d3aa8adc1ac095b14496b34b38a34343f2a905
SHA512b5aa5d7c9cbd400647b865ecd04038c83dee26b807a004fb6e1a5e89d45174ba7dfafebac7bdcc481a4737a4e966c5c73886431472229f6c0945741fae5f0e82
-
\Users\Admin\AppData\Local\d3L\BitLockerWizardElev.exeFilesize
98KB
MD573f13d791e36d3486743244f16875239
SHA1ed5ec55dbc6b3bda505f0a4c699c257c90c02020
SHA2562483d2f0ad481005cca081a86a07be9060bc6d4769c4570f92ad96fa325be9b8
SHA512911a7b532312d50cc5e7f6a046d46ab5b322aa17ce59a40477173ea50f000a95db45f169f4ea3574e3e00ae4234b9f8363ac79329d683c14ebee1d423e6e43af
-
memory/1188-29-0x0000000076DD1000-0x0000000076DD2000-memory.dmpFilesize
4KB
-
memory/1188-9-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-30-0x0000000076F60000-0x0000000076F62000-memory.dmpFilesize
8KB
-
memory/1188-4-0x0000000076BC6000-0x0000000076BC7000-memory.dmpFilesize
4KB
-
memory/1188-27-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-18-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-17-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-39-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-16-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-14-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-13-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-12-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-11-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-10-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-28-0x0000000002530000-0x0000000002537000-memory.dmpFilesize
28KB
-
memory/1188-40-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-5-0x0000000002550000-0x0000000002551000-memory.dmpFilesize
4KB
-
memory/1188-19-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-15-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-77-0x0000000076BC6000-0x0000000076BC7000-memory.dmpFilesize
4KB
-
memory/1188-8-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1188-7-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/1356-93-0x000007FEF5D40000-0x000007FEF5EA8000-memory.dmpFilesize
1.4MB
-
memory/1356-98-0x000007FEF5D40000-0x000007FEF5EA8000-memory.dmpFilesize
1.4MB
-
memory/1648-48-0x000007FEF5D70000-0x000007FEF5EA4000-memory.dmpFilesize
1.2MB
-
memory/1648-0-0x000007FEF5D70000-0x000007FEF5EA4000-memory.dmpFilesize
1.2MB
-
memory/1648-3-0x0000000000220000-0x0000000000227000-memory.dmpFilesize
28KB
-
memory/2532-62-0x000007FEF5D70000-0x000007FEF5EA6000-memory.dmpFilesize
1.2MB
-
memory/2532-59-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2532-56-0x000007FEF5D70000-0x000007FEF5EA6000-memory.dmpFilesize
1.2MB
-
memory/2808-74-0x000007FEF5D70000-0x000007FEF5EA5000-memory.dmpFilesize
1.2MB
-
memory/2808-78-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2808-81-0x000007FEF5D70000-0x000007FEF5EA5000-memory.dmpFilesize
1.2MB