Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 09:18
Static task
static1
Behavioral task
behavioral1
Sample
bafc52288eff94557ec9acdde60f3dc0_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
bafc52288eff94557ec9acdde60f3dc0_JaffaCakes118.dll
-
Size
986KB
-
MD5
bafc52288eff94557ec9acdde60f3dc0
-
SHA1
d72d53837486b490e641eb162d629ba5f0a7621b
-
SHA256
61819c444513737fc13a7684e6fa004993613415bfa7acef09a50a246f225db9
-
SHA512
5a6994f68fb33b1a1a8ba852ee5de2fa05610db3179f9612d3868dbf7cac36923263ee885b9722f0c33adc2a11a9c3f6afccb8eae7c75f7f6b518ba997e89a18
-
SSDEEP
24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1212-5-0x00000000029E0000-0x00000000029E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rekeywiz.exeSystemPropertiesComputerName.exeBdeUISrv.exepid process 2496 rekeywiz.exe 580 SystemPropertiesComputerName.exe 2924 BdeUISrv.exe -
Loads dropped DLL 7 IoCs
Processes:
rekeywiz.exeSystemPropertiesComputerName.exeBdeUISrv.exepid process 1212 2496 rekeywiz.exe 1212 580 SystemPropertiesComputerName.exe 1212 2924 BdeUISrv.exe 1212 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gqwtkfbnxxlbs = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\SYSTEM~1\\PDET1H~1\\SYSTEM~1.EXE" -
Processes:
rekeywiz.exeSystemPropertiesComputerName.exeBdeUISrv.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1688 rundll32.exe 1688 rundll32.exe 1688 rundll32.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1212 wrote to memory of 2448 1212 rekeywiz.exe PID 1212 wrote to memory of 2448 1212 rekeywiz.exe PID 1212 wrote to memory of 2448 1212 rekeywiz.exe PID 1212 wrote to memory of 2496 1212 rekeywiz.exe PID 1212 wrote to memory of 2496 1212 rekeywiz.exe PID 1212 wrote to memory of 2496 1212 rekeywiz.exe PID 1212 wrote to memory of 2016 1212 SystemPropertiesComputerName.exe PID 1212 wrote to memory of 2016 1212 SystemPropertiesComputerName.exe PID 1212 wrote to memory of 2016 1212 SystemPropertiesComputerName.exe PID 1212 wrote to memory of 580 1212 SystemPropertiesComputerName.exe PID 1212 wrote to memory of 580 1212 SystemPropertiesComputerName.exe PID 1212 wrote to memory of 580 1212 SystemPropertiesComputerName.exe PID 1212 wrote to memory of 2788 1212 BdeUISrv.exe PID 1212 wrote to memory of 2788 1212 BdeUISrv.exe PID 1212 wrote to memory of 2788 1212 BdeUISrv.exe PID 1212 wrote to memory of 2924 1212 BdeUISrv.exe PID 1212 wrote to memory of 2924 1212 BdeUISrv.exe PID 1212 wrote to memory of 2924 1212 BdeUISrv.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bafc52288eff94557ec9acdde60f3dc0_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵
-
C:\Users\Admin\AppData\Local\uLVY9O\rekeywiz.exeC:\Users\Admin\AppData\Local\uLVY9O\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵
-
C:\Users\Admin\AppData\Local\TCnmkOKn\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\TCnmkOKn\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵
-
C:\Users\Admin\AppData\Local\A5l\BdeUISrv.exeC:\Users\Admin\AppData\Local\A5l\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\A5l\BdeUISrv.exeFilesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
C:\Users\Admin\AppData\Local\A5l\WTSAPI32.dllFilesize
988KB
MD5c4c8fe665a95bc106082e9d87044d403
SHA166e5fb8c22676254e2519a5f1d399706ca4f1cea
SHA256225b93cd08919e6ebfed7db37b5bf8cac6bb35f0e3d45daeab58d59138ec18bb
SHA5121edd4443b69177ae4a795d1d09bc18ab612e1a29e950570a17b6c088a57638249b94384622d62bfa86054ff0474cc7546f09b5fe50d54216131511ea9f8a7de1
-
C:\Users\Admin\AppData\Local\TCnmkOKn\SYSDM.CPLFilesize
986KB
MD592adf2237743a15fc725db8cdf0e2fcd
SHA139244aae802fb8649b1df9d4b49479fbc9da333a
SHA25641055e56a54c21b835a7181bded23754ba99b73b8bc4f8c1eabcf7577be9e349
SHA5125d2bf0fc650d6312e06a7249e8c594e12e5d0e1fa1f873139d197f4b176790e7abc44ffece95a8453b56e049963deb079f286fcad5f2d6ef9c1bc984750d7946
-
C:\Users\Admin\AppData\Local\uLVY9O\slc.dllFilesize
987KB
MD554e670cfdeb52378ddaa5b7b3d3e0677
SHA13fa7b99bf4f2c80676d0dbcbdba83126dfe856be
SHA2569c572a1a53e19e50fd10d07a8178ce446cad48cba10aa593d5a092cc929fb340
SHA512ebf50d0e6de0145f5501a07d642295a38d4b6d6d91462a0ed9a4f30d6e9eec00df124872c5d716070a33a2babae112c7807e00f77e0a4295e231c96df328ee43
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Egmip.lnkFilesize
875B
MD54045bce660cf1e978f9c875bd6e4347f
SHA1d84030b90757eecd3dee767f57549bfebcdb7a8b
SHA25605a861205050fbf2f9c83670e7f6de4e496b509f24310185b3245bce6d4d13a3
SHA5122b0943cc8f438098cde60efeff3e193edf9473b4f388d536051bfd1eb4328dab8082bb589d24595aa3cba2cab1c92a9a6cff6d821441819359c00c374db0f693
-
\Users\Admin\AppData\Local\TCnmkOKn\SystemPropertiesComputerName.exeFilesize
80KB
MD5bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026
-
\Users\Admin\AppData\Local\uLVY9O\rekeywiz.exeFilesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
memory/580-77-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/580-71-0x0000000000080000-0x0000000000087000-memory.dmpFilesize
28KB
-
memory/1212-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-25-0x0000000077CD1000-0x0000000077CD2000-memory.dmpFilesize
4KB
-
memory/1212-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-26-0x0000000077E60000-0x0000000077E62000-memory.dmpFilesize
8KB
-
memory/1212-4-0x0000000077AC6000-0x0000000077AC7000-memory.dmpFilesize
4KB
-
memory/1212-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-5-0x00000000029E0000-0x00000000029E1000-memory.dmpFilesize
4KB
-
memory/1212-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-24-0x00000000029C0000-0x00000000029C7000-memory.dmpFilesize
28KB
-
memory/1212-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-52-0x0000000077AC6000-0x0000000077AC7000-memory.dmpFilesize
4KB
-
memory/1212-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1212-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1688-42-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1688-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1688-3-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2496-59-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2496-54-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2496-53-0x00000000001F0000-0x00000000001F7000-memory.dmpFilesize
28KB
-
memory/2924-89-0x0000000000270000-0x0000000000277000-memory.dmpFilesize
28KB
-
memory/2924-95-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB