Analysis
-
max time kernel
149s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
aa742ad016ba5eda435c40d9f81a71b3_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
aa742ad016ba5eda435c40d9f81a71b3_JaffaCakes118.dll
-
Size
987KB
-
MD5
aa742ad016ba5eda435c40d9f81a71b3
-
SHA1
65b0997bc86db191897e2a157be2534aa2edac28
-
SHA256
64f22c7a2ed309028e20b2fbe5fe093112ee81893877c6308846342020c855b7
-
SHA512
105cf6705de994afe6ad873f2a30641edf9e7795e9e4bb3cc5f35fff7a0d430b854d1689972fc60d1038972a408281b6d4e5dd429f87f0b5ab6ce07a9f1adcb2
-
SSDEEP
24576:YVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8W:YV8hf6STw1ZlQauvzSq01ICe6zvmN
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3384-4-0x0000000002CD0000-0x0000000002CD1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
RdpSaUacHelper.exeBitLockerWizardElev.exerdpclip.exepid process 3596 RdpSaUacHelper.exe 1676 BitLockerWizardElev.exe 3076 rdpclip.exe -
Loads dropped DLL 3 IoCs
Processes:
RdpSaUacHelper.exeBitLockerWizardElev.exerdpclip.exepid process 3596 RdpSaUacHelper.exe 1676 BitLockerWizardElev.exe 3076 rdpclip.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pruztwesow = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Vault\\N4\\BitLockerWizardElev.exe" -
Processes:
BitLockerWizardElev.exerdpclip.exerundll32.exeRdpSaUacHelper.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSaUacHelper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1348 rundll32.exe 1348 rundll32.exe 1348 rundll32.exe 1348 rundll32.exe 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
pid process 3384 3384 3384 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 3384 3384 3384 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3384 wrote to memory of 3024 3384 RdpSaUacHelper.exe PID 3384 wrote to memory of 3024 3384 RdpSaUacHelper.exe PID 3384 wrote to memory of 3596 3384 RdpSaUacHelper.exe PID 3384 wrote to memory of 3596 3384 RdpSaUacHelper.exe PID 3384 wrote to memory of 3096 3384 BitLockerWizardElev.exe PID 3384 wrote to memory of 3096 3384 BitLockerWizardElev.exe PID 3384 wrote to memory of 1676 3384 BitLockerWizardElev.exe PID 3384 wrote to memory of 1676 3384 BitLockerWizardElev.exe PID 3384 wrote to memory of 3088 3384 rdpclip.exe PID 3384 wrote to memory of 3088 3384 rdpclip.exe PID 3384 wrote to memory of 3076 3384 rdpclip.exe PID 3384 wrote to memory of 3076 3384 rdpclip.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa742ad016ba5eda435c40d9f81a71b3_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\RdpSaUacHelper.exeC:\Windows\system32\RdpSaUacHelper.exe1⤵
-
C:\Users\Admin\AppData\Local\Lj8gt\RdpSaUacHelper.exeC:\Users\Admin\AppData\Local\Lj8gt\RdpSaUacHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵
-
C:\Users\Admin\AppData\Local\RhEEin\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\RhEEin\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵
-
C:\Users\Admin\AppData\Local\zDn1Eb16v\rdpclip.exeC:\Users\Admin\AppData\Local\zDn1Eb16v\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Lj8gt\RdpSaUacHelper.exeFilesize
33KB
MD50d5b016ac7e7b6257c069e8bb40845de
SHA15282f30e90cbd1be8da95b73bc1b6a7d041e43c2
SHA2566a6fdd834af9c79c5ffc5e6b51700030259aeae535f8626df84b07b7d2cee067
SHA512cd44d8b70fc67c692e6966b4ad86a7de9c96df0bade1b3a80cb4767be159d64f3cc04dc5934f7d843b15101865089e43b8aecabddc370b22caf0c48b56b3430e
-
C:\Users\Admin\AppData\Local\Lj8gt\WINSTA.dllFilesize
994KB
MD53317eca7f008498befdeeb4fa5112d72
SHA192d46a597edfbad35e14337e9e0f009b85176fd3
SHA256ac6fed87285b984e7c170e5dd1b1d4b8e73426cb28cad49df5a52df25128ea8f
SHA512a23460e82f724eedba6ce511fc6a65e0204f9b2a80efbce38630d57222122329238c809aad53bf43bfee87b36ebb54b10bb4429134ece722c38a2465af0ea6b5
-
C:\Users\Admin\AppData\Local\RhEEin\BitLockerWizardElev.exeFilesize
100KB
MD58ac5a3a20cf18ae2308c64fd707eeb81
SHA131f2f0bdc2eb3e0d2a6cd626ea8ed71262865544
SHA256803eb37617d450704766cb167dc9766e82102a94940a26a988ad26ab8be3f2f5
SHA51285d0e28e4bffec709f26b2f0d20eb76373134af43bcaa70b97a03efa273b77dd4fbd4f6ee026774ce4029ab5a983aea057111efcd234ab1686a9bd0f7202748b
-
C:\Users\Admin\AppData\Local\RhEEin\FVEWIZ.dllFilesize
990KB
MD5bca622476c361ec71c5b3d4d0069ba89
SHA1a61375c743c69a2772bada2d4ce6dcb0f8910c21
SHA2565e7a3134cddfae1cfe891140fa2d2a91d8b61c1e2d9b8a665bdbb9535cfc7c25
SHA5123ea760a9fa93d6b68de23cf6ca784c183686e3addd2dcab449b3cbfe4b3c76ff5ab914fb27f5c2cc6f8ae922716121235d952d4755893dae402cc4a2fd3336a8
-
C:\Users\Admin\AppData\Local\zDn1Eb16v\WINSTA.dllFilesize
994KB
MD5296bd9f99ba287cabe4ffac8fc434dd0
SHA1ff8f6fda0d38d67ade42e77b6958e29bd1ea5428
SHA256b94880f956742b64b3c1fa34974834d62ba6ff67858316347956ebd666fcbca1
SHA512b9bc03711831b30f566269e2d99059646a42e3712de412e7047ac60af18016d96793bc0b7daa2e8d5210d979824cdb5de36cb92e8af76f9849dadc820382f35c
-
C:\Users\Admin\AppData\Local\zDn1Eb16v\rdpclip.exeFilesize
446KB
MD5a52402d6bd4e20a519a2eeec53332752
SHA1129f2b6409395ef877b9ca39dd819a2703946a73
SHA2569d5be181d9309dea98039d2ce619afe745fc8a9a1b1c05cf860b3620b5203308
SHA512632dda67066cff2b940f27e3f409e164684994a02bda57d74e958c462b9a0963e922be4a487c06126cecc9ef34d34913ef8315524bf8422f83c0c135b8af924e
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Arcabpqqvo.lnkFilesize
1KB
MD5af9a73186793123a5ccc656ca208cfb8
SHA17ee5c4db149eaf5a4361058d64ab5a42f43fa080
SHA2562c6e0975b6b6f30b7e82da04a06be0f7ede746437735a71cf6808fefd0abc0a6
SHA512e89c94e2085843008104e7c9f9c1eb91d464b8d156db1883f5c674e316ee218b4a4a406e8bd019a9b885815debc1536a9ca8c22c30d053cbb4778b5e3115eb5b
-
memory/1348-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1348-3-0x000001D29FEE0000-0x000001D29FEE7000-memory.dmpFilesize
28KB
-
memory/1348-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1676-62-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1676-61-0x00000264A3E30000-0x00000264A3E37000-memory.dmpFilesize
28KB
-
memory/1676-67-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3076-84-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3076-81-0x00000196EA3C0000-0x00000196EA3C7000-memory.dmpFilesize
28KB
-
memory/3384-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-6-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-26-0x00007FFA208BA000-0x00007FFA208BB000-memory.dmpFilesize
4KB
-
memory/3384-4-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/3384-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-27-0x0000000002C80000-0x0000000002C87000-memory.dmpFilesize
28KB
-
memory/3384-28-0x00007FFA21790000-0x00007FFA217A0000-memory.dmpFilesize
64KB
-
memory/3384-22-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-34-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3384-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3596-50-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3596-44-0x0000028301250000-0x0000028301257000-memory.dmpFilesize
28KB
-
memory/3596-45-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB