Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
7303cf03681a2d8ce2bb2394c9ad8b2d_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
7303cf03681a2d8ce2bb2394c9ad8b2d_JaffaCakes118.dll
-
Size
989KB
-
MD5
7303cf03681a2d8ce2bb2394c9ad8b2d
-
SHA1
3f05fbfc73e0417121d2136ec9625be7e98b657d
-
SHA256
d0b3168b35cde2b10104172a2f4ea91ccc3c2fc7adeb848d4db55c48d7a333da
-
SHA512
f9ccb27b279372bb96cb954359e7343f19be65340aa9aed4d66011f6ac718ac5ef4a42675d08344ad667778bb3a24c9392128a3149a40087d804b93e219063be
-
SSDEEP
24576:jVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:jV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3524-4-0x0000000000780000-0x0000000000781000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DisplaySwitch.exeBitLockerWizardElev.exeDmNotificationBroker.exepid process 3532 DisplaySwitch.exe 324 BitLockerWizardElev.exe 4564 DmNotificationBroker.exe -
Loads dropped DLL 3 IoCs
Processes:
DisplaySwitch.exeBitLockerWizardElev.exeDmNotificationBroker.exepid process 3532 DisplaySwitch.exe 324 BitLockerWizardElev.exe 4564 DmNotificationBroker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Esxju = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\FnGhF\\BitLockerWizardElev.exe" -
Processes:
DisplaySwitch.exeBitLockerWizardElev.exeDmNotificationBroker.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DmNotificationBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1296 rundll32.exe 1296 rundll32.exe 1296 rundll32.exe 1296 rundll32.exe 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3524 Token: SeCreatePagefilePrivilege 3524 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3524 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3524 wrote to memory of 4584 3524 DisplaySwitch.exe PID 3524 wrote to memory of 4584 3524 DisplaySwitch.exe PID 3524 wrote to memory of 3532 3524 DisplaySwitch.exe PID 3524 wrote to memory of 3532 3524 DisplaySwitch.exe PID 3524 wrote to memory of 4880 3524 BitLockerWizardElev.exe PID 3524 wrote to memory of 4880 3524 BitLockerWizardElev.exe PID 3524 wrote to memory of 324 3524 BitLockerWizardElev.exe PID 3524 wrote to memory of 324 3524 BitLockerWizardElev.exe PID 3524 wrote to memory of 1092 3524 DmNotificationBroker.exe PID 3524 wrote to memory of 1092 3524 DmNotificationBroker.exe PID 3524 wrote to memory of 4564 3524 DmNotificationBroker.exe PID 3524 wrote to memory of 4564 3524 DmNotificationBroker.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7303cf03681a2d8ce2bb2394c9ad8b2d_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=3404 /prefetch:81⤵PID:4872
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵PID:4584
-
C:\Users\Admin\AppData\Local\Ryvq6Iw\DisplaySwitch.exeC:\Users\Admin\AppData\Local\Ryvq6Iw\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3532
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵PID:4880
-
C:\Users\Admin\AppData\Local\qLB9ouOYQ\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\qLB9ouOYQ\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:324
-
C:\Windows\system32\DmNotificationBroker.exeC:\Windows\system32\DmNotificationBroker.exe1⤵PID:1092
-
C:\Users\Admin\AppData\Local\PWsR\DmNotificationBroker.exeC:\Users\Admin\AppData\Local\PWsR\DmNotificationBroker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e8996ab8c0fb0ba1c01acaf31854fea1
SHA12c8c773e910e3dec71845e1ee2a607792dd4adf6
SHA256e97979851b97d42e2e83c8255ec2061b3548fc1f772b5548986cb345d9267bf1
SHA5122127684e14fb1befd4e8350d87cbc677b26cdef7198e7600c6f8ea4c7077df24f6ec13d154f829485acf12126504539395cce6c554b34f8134cf992f8be748cd
-
Filesize
32KB
MD5f0bdc20540d314a2aad951c7e2c88420
SHA14ab344595a4a81ab5f31ed96d72f217b4cee790b
SHA256f87537e5f26193a2273380f86cc9ac16d977f65b0eff2435e40be830fd99f7b5
SHA512cb69e35b2954406735264a4ae8fe1eca1bd4575f553ab2178c70749ab997bda3c06496d2fce97872c51215a19093e51eea7cc8971af62ad9d5726f3a0d2730aa
-
Filesize
1.8MB
MD55338d4beddf23db817eb5c37500b5735
SHA11b5c56f00b53fca3205ff24770203af46cbc7c54
SHA2568b581f1d15a6920e4ecfe172d8ef753d0a2bf1a47e686a8d5d8e01147fa4c65e
SHA512173170b83e0048ee05da18c0c957744204954da58a93c532b669d62edb632c4c73d0744c13eb864ecf357ff12831aa46c4f2445dc33b62a4547385b9e0297b0c
-
Filesize
991KB
MD556b393032a8726505ff74ea9021c62b3
SHA1f063030926cf92398f2b10b7380f2e8793fc58ca
SHA2564e7aa1f17fba950f3f94a629e91debb69ffd9640742db00d1a2944227fe2680e
SHA51267a1b409f826f562071e89fda056550cbe343e692bd3af582ff35d3f19990ee28434a1b22535db8ffa21855b89445aaf311947a73a802696391459dbc0554ca5
-
Filesize
100KB
MD58ac5a3a20cf18ae2308c64fd707eeb81
SHA131f2f0bdc2eb3e0d2a6cd626ea8ed71262865544
SHA256803eb37617d450704766cb167dc9766e82102a94940a26a988ad26ab8be3f2f5
SHA51285d0e28e4bffec709f26b2f0d20eb76373134af43bcaa70b97a03efa273b77dd4fbd4f6ee026774ce4029ab5a983aea057111efcd234ab1686a9bd0f7202748b
-
Filesize
991KB
MD5e08875e49b8069c45c2af649bf385618
SHA14c396a9865b2c9e9fc95d680b549ac29e1686135
SHA256080fa2d1d9d238a43d65b4e55f4e6ce1550bf6cafda082f5a52dda08f7b668c6
SHA512923d87074e31070ef06f7e2828baa9440d130f1f515a6fcbd49fd2055a36ac232eadf3d8cf528d37f10e77e4d7d956d23849fa24e213a5f71d044075c0d7a864
-
Filesize
1KB
MD56e487f81e16a37804bec77f2b5ba2308
SHA10436c9798b762cd5437e7e1601e9741f0863fa75
SHA256b41e0c22784b7951a3d28dc14f4a588c838beaa17c758e6706e40c428c467084
SHA512db6010f43ba12f79bdadaa057128e841fed5ddd206fd7d8e6179ad4e2c0704689340b6ce7c10b4b45875d8e2145da18497b087eb636a8d2e45ea30a59f1104b6