Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
735987d7f53d7ef2e1bf1a55e1e1d8ce_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
735987d7f53d7ef2e1bf1a55e1e1d8ce_JaffaCakes118.dll
-
Size
987KB
-
MD5
735987d7f53d7ef2e1bf1a55e1e1d8ce
-
SHA1
13119a072097873309619feaf6a6736587d3d944
-
SHA256
4b3d199a8271663812b5e8a440180946e7e49ed1a06cd0cc71a0bcb0ac17652e
-
SHA512
a60be5e0ed5e70d5af73762a9948a8608f9b96ef74fb4b24fb78de123bc8ec7e5f26719da8f470ad96c36fc1ca0d99b45d7708faa0c696119551e5f7e43c1819
-
SSDEEP
24576:6VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:6V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1368-5-0x00000000029E0000-0x00000000029E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
BitLockerWizard.exeUtilman.exemblctr.exepid process 2412 BitLockerWizard.exe 788 Utilman.exe 340 mblctr.exe -
Loads dropped DLL 7 IoCs
Processes:
BitLockerWizard.exeUtilman.exemblctr.exepid process 1368 2412 BitLockerWizard.exe 1368 788 Utilman.exe 1368 340 mblctr.exe 1368 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\#SHARE~1\\oHV3be\\Utilman.exe" -
Processes:
BitLockerWizard.exeUtilman.exemblctr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1368 wrote to memory of 2468 1368 BitLockerWizard.exe PID 1368 wrote to memory of 2468 1368 BitLockerWizard.exe PID 1368 wrote to memory of 2468 1368 BitLockerWizard.exe PID 1368 wrote to memory of 2412 1368 BitLockerWizard.exe PID 1368 wrote to memory of 2412 1368 BitLockerWizard.exe PID 1368 wrote to memory of 2412 1368 BitLockerWizard.exe PID 1368 wrote to memory of 588 1368 Utilman.exe PID 1368 wrote to memory of 588 1368 Utilman.exe PID 1368 wrote to memory of 588 1368 Utilman.exe PID 1368 wrote to memory of 788 1368 Utilman.exe PID 1368 wrote to memory of 788 1368 Utilman.exe PID 1368 wrote to memory of 788 1368 Utilman.exe PID 1368 wrote to memory of 1208 1368 mblctr.exe PID 1368 wrote to memory of 1208 1368 mblctr.exe PID 1368 wrote to memory of 1208 1368 mblctr.exe PID 1368 wrote to memory of 340 1368 mblctr.exe PID 1368 wrote to memory of 340 1368 mblctr.exe PID 1368 wrote to memory of 340 1368 mblctr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\735987d7f53d7ef2e1bf1a55e1e1d8ce_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\4P2NVWxn\BitLockerWizard.exeC:\Users\Admin\AppData\Local\4P2NVWxn\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵
-
C:\Users\Admin\AppData\Local\MoRKm\Utilman.exeC:\Users\Admin\AppData\Local\MoRKm\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵
-
C:\Users\Admin\AppData\Local\Rjt\mblctr.exeC:\Users\Admin\AppData\Local\Rjt\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\4P2NVWxn\FVEWIZ.dllFilesize
989KB
MD5404942eddb31f4451ddde546cbdf703f
SHA17e686dda48bbb1ead71fefecb18b557113ab98c8
SHA256de891c9d5d81ed6a740d679e780015cd8eebb244d12aafd417aa383d89aa7d67
SHA5123ba8f69aed15dfe7444c4559815886bc354fabb98664fa6d096fe3506f96c9a31c481f1cedf4c3ac38c90bd504fa7183432ce0c0a04603e2a92fc742063d1f34
-
C:\Users\Admin\AppData\Local\MoRKm\DUI70.dllFilesize
1.2MB
MD5a29018fb154ef002938303186adbbd79
SHA1721b3b6b5e67a18c00ce38859adf929af55c89d3
SHA2569dffbe87acdebcec08ce232d54b442c62580a5f25b029664f74d0b930c4d4bda
SHA512b219a83c05f18e5ec291002ca1c961077d7b630f47429da13f3458ea05969aa1c896f1d834be0c3c305bcbb270022d6bd6e0d8eb2945b00e69f65bd330dc2e76
-
C:\Users\Admin\AppData\Local\Rjt\WINMM.dllFilesize
992KB
MD55e027ce651f2f2d0385c93941ad6a595
SHA11c75970f4c36e61467b810a42b8f49d4b47ef1e6
SHA256a560c2bab5c176f3eb6f60b3b84745c632132d04e0d46e4459d82defd380d7a8
SHA51240b5100b6f9759732ce97f2b600a113060081aaeadda10e84cb72b4b71d99fe4d324489d2425db74ba51d540f7a73096eeca099035e23080a597aa4c52c6f4df
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnkFilesize
1KB
MD50df19a8b5061f1de0458f83c39e7e96f
SHA1104506409e29cc1c87d10d14434a233e1fc3765c
SHA256ccd02f53a875f2b7b89a9ebb83d39e8d223eb7fed23fb78eb1f934cbad415dfa
SHA512fb95bf8f7f7d38857b714d8606e5870323f1b31964e183b39925d511d0a178f6778739b62990503b98e8fc304e02a5fc726ff862ac3d79ae6dc7957fd95b9ac6
-
\Users\Admin\AppData\Local\4P2NVWxn\BitLockerWizard.exeFilesize
98KB
MD508a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
\Users\Admin\AppData\Local\MoRKm\Utilman.exeFilesize
1.3MB
MD532c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
\Users\Admin\AppData\Local\Rjt\mblctr.exeFilesize
935KB
MD5fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55
-
memory/340-90-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/340-84-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/788-71-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/788-66-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/788-65-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/1368-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-5-0x00000000029E0000-0x00000000029E1000-memory.dmpFilesize
4KB
-
memory/1368-30-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-29-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-27-0x00000000774A1000-0x00000000774A2000-memory.dmpFilesize
4KB
-
memory/1368-24-0x0000000002200000-0x0000000002207000-memory.dmpFilesize
28KB
-
memory/1368-4-0x0000000077396000-0x0000000077397000-memory.dmpFilesize
4KB
-
memory/1368-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-28-0x0000000077630000-0x0000000077632000-memory.dmpFilesize
8KB
-
memory/1368-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1368-64-0x0000000077396000-0x0000000077397000-memory.dmpFilesize
4KB
-
memory/1368-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2412-52-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2412-47-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2412-46-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/2752-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2752-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2752-0-0x00000000004A0000-0x00000000004A7000-memory.dmpFilesize
28KB