Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
a03c427291b7a95b1aab3b2d9839a4ac_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
a03c427291b7a95b1aab3b2d9839a4ac_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a03c427291b7a95b1aab3b2d9839a4ac
-
SHA1
f65ffc2a7a1d263bfa112d9bade412e2907a06fb
-
SHA256
439fb687b9a2d78aa8385a756084b8c76c40972a59030daa92153cc60b8fa7d1
-
SHA512
504fcbed01f3c79a4a32bf3646f5ac7d4933e2b0f374a8782b7d227cee484c929c6021c7359e707158d669bbe6fa1a8f887a063b03cb50b45d1e4562adbee208
-
SSDEEP
24576:WVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:WV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3432-4-0x0000000002E40000-0x0000000002E41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
Processes:
BitLockerWizard.execonsent.exeMusNotificationUx.exeisoburn.exepid process 2696 BitLockerWizard.exe 2168 consent.exe 4968 MusNotificationUx.exe 1308 isoburn.exe -
Loads dropped DLL 3 IoCs
Processes:
BitLockerWizard.exeMusNotificationUx.exeisoburn.exepid process 2696 BitLockerWizard.exe 4968 MusNotificationUx.exe 1308 isoburn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ehsiuzwuc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Credentials\\UNf0zK2by\\MusNotificationUx.exe" -
Processes:
rundll32.exeBitLockerWizard.exeMusNotificationUx.exeisoburn.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MusNotificationUx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3432 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid process target process PID 3432 wrote to memory of 828 3432 BitLockerWizard.exe PID 3432 wrote to memory of 828 3432 BitLockerWizard.exe PID 3432 wrote to memory of 2696 3432 BitLockerWizard.exe PID 3432 wrote to memory of 2696 3432 BitLockerWizard.exe PID 3432 wrote to memory of 3192 3432 consent.exe PID 3432 wrote to memory of 3192 3432 consent.exe PID 3432 wrote to memory of 2168 3432 consent.exe PID 3432 wrote to memory of 2168 3432 consent.exe PID 3432 wrote to memory of 3360 3432 MusNotificationUx.exe PID 3432 wrote to memory of 3360 3432 MusNotificationUx.exe PID 3432 wrote to memory of 4968 3432 MusNotificationUx.exe PID 3432 wrote to memory of 4968 3432 MusNotificationUx.exe PID 3432 wrote to memory of 3884 3432 isoburn.exe PID 3432 wrote to memory of 3884 3432 isoburn.exe PID 3432 wrote to memory of 1308 3432 isoburn.exe PID 3432 wrote to memory of 1308 3432 isoburn.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a03c427291b7a95b1aab3b2d9839a4ac_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\YPMD5avn\BitLockerWizard.exeC:\Users\Admin\AppData\Local\YPMD5avn\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵
-
C:\Users\Admin\AppData\Local\ffoKKzT\consent.exeC:\Users\Admin\AppData\Local\ffoKKzT\consent.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\MusNotificationUx.exeC:\Windows\system32\MusNotificationUx.exe1⤵
-
C:\Users\Admin\AppData\Local\nAX2\MusNotificationUx.exeC:\Users\Admin\AppData\Local\nAX2\MusNotificationUx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵
-
C:\Users\Admin\AppData\Local\cXgY\isoburn.exeC:\Users\Admin\AppData\Local\cXgY\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\YPMD5avn\BitLockerWizard.exeFilesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
C:\Users\Admin\AppData\Local\YPMD5avn\FVEWIZ.dllFilesize
1.2MB
MD5d07c716fe54bbe24c5c1d3fbd0ca9c90
SHA196eecf472095c988e1c7e7697fdece82f0865d94
SHA256484e2b7c66c22b4cd415c82d4e9fc4f5298189bd9d18e4b9648bd81ac49f3d10
SHA5128875e9bc6ec7f6ec9e2db89fbcde9be1717172910cf64809f53e69c8ede7c4e9ed9584aa8ae3d1f155ef6366944ed75b5f987d9936c6617e53f7f9a399bc5506
-
C:\Users\Admin\AppData\Local\cXgY\UxTheme.dllFilesize
1.2MB
MD59bf1dd1a536148da598b240ee80e4447
SHA1b76eed504e848d61a849b4f4e63c972fa7bb61ed
SHA2564018f166c09de97171b9538eda8dffc899ca7719f3454fca6b8250472b1d61ed
SHA512e37d569643f72eb782a3f5a2d1cbc8480f956364690b406c6999dcb5f09300e19551979ba9d4b87229a0e88d0317a51370dc6401ff32d1e9d10f6ccc83634f54
-
C:\Users\Admin\AppData\Local\cXgY\isoburn.exeFilesize
119KB
MD568078583d028a4873399ae7f25f64bad
SHA1a3c928fe57856a10aed7fee17670627fe663e6fe
SHA2569478c095afe212bce91d2de1a3c3647109f2d54e46b9bf70843e839324458567
SHA51225503a47c53fe83eeb56726b5a5eec5cb01bc783e866306f92242a7a8cbafa20a3209217e0f4561febfec78d2f64f1725727a6b2d3ee6da512618984d0bb0bc1
-
C:\Users\Admin\AppData\Local\ffoKKzT\consent.exeFilesize
162KB
MD56646631ce4ad7128762352da81f3b030
SHA11095bd4b63360fc2968d75622aa745e5523428ab
SHA25656b2d516376328129132b815e22379ae8e7176825f059c9374a33cc844482e64
SHA5121c00ed5d8568f6ebd119524b61573cfe71ca828bd8fbdd150158ec8b5db65fa066908d120d201fce6222707bcb78e0c1151b82fdc1dccf3ada867cb810feb6da
-
C:\Users\Admin\AppData\Local\nAX2\MusNotificationUx.exeFilesize
615KB
MD5869a214114a81712199f3de5d69d9aad
SHA1be973e4188eff0d53fdf0e9360106e8ad946d89f
SHA256405c2df9a36d7cfb5c8382c96f04792eb88c11a6cfa36b1d2ec3e0bec8d17361
SHA512befcdeb8de6e68b9ee0bacd4cbc80f7393a0213d4039b239c98585e0cd5db1755c75559a62372374cbfb7132b6a7973ea9e6a31952e0e0ba007079c56e6d9012
-
C:\Users\Admin\AppData\Local\nAX2\XmlLite.dllFilesize
1.2MB
MD5b4877932f4a32f2f84fb501817d27987
SHA1e104ff0c7f152cb51184690a50a9d4f13cc40e61
SHA256db82423c0aba4a6716d3d3377e826f15bf465a91efbef9e165f354912b764067
SHA51263ce6ef7d1791abe744e8cf677b1200e0eb6f91245d8c274ab0169a7210975a4e3c00b8f81065fc802b39e96549a65773c780f7d0f63978f2edcbe10816f0ce0
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Jbphew.lnkFilesize
1KB
MD54cccbaf004b904d050eb7cb7be222492
SHA12b517480cbf5c3c0ee36b4c84007dabf7f34b444
SHA256a079da3bed61aa7a3f3b4fb55baf046e61055d53fb7eae01241155487be8026d
SHA512774ed50aa846ed9b602e43b011aab8d63095b62c5578a29f77ae4bb3e29881da719f08bf2fcc1d87ff4ad16b05a236bb74be965215a4391effb9e62b6ceba536
-
memory/1308-92-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2696-45-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2696-50-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2696-48-0x000001F9F8F20000-0x000001F9F8F27000-memory.dmpFilesize
28KB
-
memory/2920-38-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/2920-1-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/2920-3-0x000001876C070000-0x000001876C077000-memory.dmpFilesize
28KB
-
memory/3432-28-0x0000000002E00000-0x0000000002E07000-memory.dmpFilesize
28KB
-
memory/3432-35-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-8-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-9-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-10-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-11-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-12-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-14-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-27-0x00007FFC8F48A000-0x00007FFC8F48B000-memory.dmpFilesize
4KB
-
memory/3432-7-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-29-0x00007FFC8F890000-0x00007FFC8F8A0000-memory.dmpFilesize
64KB
-
memory/3432-4-0x0000000002E40000-0x0000000002E41000-memory.dmpFilesize
4KB
-
memory/3432-6-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-23-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3432-13-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/4968-76-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/4968-73-0x000001E402A40000-0x000001E402A47000-memory.dmpFilesize
28KB