Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
ba78189a1e1389cdcf5478ec3ec0f8c2_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
ba78189a1e1389cdcf5478ec3ec0f8c2_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
ba78189a1e1389cdcf5478ec3ec0f8c2
-
SHA1
0b5278a45fb91bddbc33841fcdd4074bda3377f2
-
SHA256
6e595a15eb50e2fc6c4d76554b992ab4a81be446c4b8b450e84ed308f7dcf341
-
SHA512
f59f0409426fad48a60cfed2cdd33d523699f7c23fb4dfb1dccc5525a7c5be2dacb5c612debb73a2d0af69748fe78f2276c5653feb7b655e794205af11ec692d
-
SSDEEP
24576:5VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:5V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1340-5-0x0000000002D20000-0x0000000002D21000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
BitLockerWizardElev.exefveprompt.exewinlogon.exepid process 2760 BitLockerWizardElev.exe 864 fveprompt.exe 1240 winlogon.exe -
Loads dropped DLL 7 IoCs
Processes:
BitLockerWizardElev.exefveprompt.exewinlogon.exepid process 1340 2760 BitLockerWizardElev.exe 1340 864 fveprompt.exe 1340 1240 winlogon.exe 1340 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Groztcac = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\ACCESS~1\\8W1\\FVEPRO~1.EXE" -
Processes:
rundll32.exeBitLockerWizardElev.exefveprompt.exewinlogon.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1340 wrote to memory of 2720 1340 BitLockerWizardElev.exe PID 1340 wrote to memory of 2720 1340 BitLockerWizardElev.exe PID 1340 wrote to memory of 2720 1340 BitLockerWizardElev.exe PID 1340 wrote to memory of 2760 1340 BitLockerWizardElev.exe PID 1340 wrote to memory of 2760 1340 BitLockerWizardElev.exe PID 1340 wrote to memory of 2760 1340 BitLockerWizardElev.exe PID 1340 wrote to memory of 2768 1340 fveprompt.exe PID 1340 wrote to memory of 2768 1340 fveprompt.exe PID 1340 wrote to memory of 2768 1340 fveprompt.exe PID 1340 wrote to memory of 864 1340 fveprompt.exe PID 1340 wrote to memory of 864 1340 fveprompt.exe PID 1340 wrote to memory of 864 1340 fveprompt.exe PID 1340 wrote to memory of 2440 1340 winlogon.exe PID 1340 wrote to memory of 2440 1340 winlogon.exe PID 1340 wrote to memory of 2440 1340 winlogon.exe PID 1340 wrote to memory of 1240 1340 winlogon.exe PID 1340 wrote to memory of 1240 1340 winlogon.exe PID 1340 wrote to memory of 1240 1340 winlogon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba78189a1e1389cdcf5478ec3ec0f8c2_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵PID:2720
-
C:\Users\Admin\AppData\Local\vve\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\vve\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2760
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵PID:2768
-
C:\Users\Admin\AppData\Local\ihTpsuX\fveprompt.exeC:\Users\Admin\AppData\Local\ihTpsuX\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:864
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵PID:2440
-
C:\Users\Admin\AppData\Local\3kl7eEI2F\winlogon.exeC:\Users\Admin\AppData\Local\3kl7eEI2F\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5590fe8e9781145f521354708165e1d8a
SHA16b6f8ce9efb5adcec7102fb6bf972b6183589550
SHA2566c92c354c5ab2e72bdfce0bc65b366acecc34f8eddde6f0ac5c7fc9a109fc0f4
SHA51290b9b37dd8089105de6da70421788956c42876043f1e6854e9c1c0b6fb0d0cd6887013f583482b89ef8711ae07054dbd8ceb4fc1044b19afa459a3e1c84b7a28
-
Filesize
1.2MB
MD5ad74bf5c3aae8aff3b3783455ab06f29
SHA11fc012d0a2be3e7601dbc9c9f8e46219010d07f5
SHA2565d47a01c8a98a360cc6e9f82cc2a8e667c51ff51c7f0fbbd3332f43fe10d57bc
SHA512f5a9a0b4a8075eb3d45e70bdc6d0d1195f5d1468e9166ae0044d10dcc4585b8f3f8a476f73ea62bb8c649b8e618a89b0d93a97559c889bdb073722d4190c7b5c
-
Filesize
1.2MB
MD5ae7c45f2ca77f3f598d800e87746a91d
SHA142d5cbea83453880d71e9359998df7a976582119
SHA2568df519b3c539e92d4c0917aabcccebc4230ee4ee4235c68e2ed8884082a79632
SHA512b48791c7a349c2ec14208093158316620cf945bb93b704a7a86c8cd568f6560469ac5825ce961cc3279f58b662e38f6959b188e309548e5177852ca04b6e91af
-
Filesize
1KB
MD55ce7930f76edc78f3623875266cd9f20
SHA16d8be6b457329be99bf01dff965bc06d3fc8ba65
SHA256d14a9111a30bc13299d2c36b836921ef1f7a20ef92046273f3dfa81188f1a8a7
SHA512ecbdfb72eec0843583bb3048e2f5e3ccccce1ec2b2efc921e8f50df0ed049283ab83daf12d9a5f9edfe2eed34a6c7cd6257f1d1b0d9ceb2c2b6c5218124d34b6
-
Filesize
381KB
MD51151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
Filesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc
-
Filesize
98KB
MD573f13d791e36d3486743244f16875239
SHA1ed5ec55dbc6b3bda505f0a4c699c257c90c02020
SHA2562483d2f0ad481005cca081a86a07be9060bc6d4769c4570f92ad96fa325be9b8
SHA512911a7b532312d50cc5e7f6a046d46ab5b322aa17ce59a40477173ea50f000a95db45f169f4ea3574e3e00ae4234b9f8363ac79329d683c14ebee1d423e6e43af