Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 09:18
Static task
static1
Behavioral task
behavioral1
Sample
bafc52288eff94557ec9acdde60f3dc0_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
bafc52288eff94557ec9acdde60f3dc0_JaffaCakes118.dll
-
Size
986KB
-
MD5
bafc52288eff94557ec9acdde60f3dc0
-
SHA1
d72d53837486b490e641eb162d629ba5f0a7621b
-
SHA256
61819c444513737fc13a7684e6fa004993613415bfa7acef09a50a246f225db9
-
SHA512
5a6994f68fb33b1a1a8ba852ee5de2fa05610db3179f9612d3868dbf7cac36923263ee885b9722f0c33adc2a11a9c3f6afccb8eae7c75f7f6b518ba997e89a18
-
SSDEEP
24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3352-4-0x00000000008F0000-0x00000000008F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
bdeunlock.exeLicensingUI.exeSystemSettingsRemoveDevice.exepid process 4784 bdeunlock.exe 3104 LicensingUI.exe 4532 SystemSettingsRemoveDevice.exe -
Loads dropped DLL 3 IoCs
Processes:
bdeunlock.exeLicensingUI.exeSystemSettingsRemoveDevice.exepid process 4784 bdeunlock.exe 3104 LicensingUI.exe 4532 SystemSettingsRemoveDevice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iphtcfjrejti = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\m8eFMV\\LicensingUI.exe" -
Processes:
rundll32.exebdeunlock.exeLicensingUI.exeSystemSettingsRemoveDevice.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdeunlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LicensingUI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsRemoveDevice.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 884 rundll32.exe 884 rundll32.exe 884 rundll32.exe 884 rundll32.exe 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
pid process 3352 3352 3352 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 3352 3352 3352 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3352 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3352 wrote to memory of 4580 3352 bdeunlock.exe PID 3352 wrote to memory of 4580 3352 bdeunlock.exe PID 3352 wrote to memory of 4784 3352 bdeunlock.exe PID 3352 wrote to memory of 4784 3352 bdeunlock.exe PID 3352 wrote to memory of 1344 3352 LicensingUI.exe PID 3352 wrote to memory of 1344 3352 LicensingUI.exe PID 3352 wrote to memory of 3104 3352 LicensingUI.exe PID 3352 wrote to memory of 3104 3352 LicensingUI.exe PID 3352 wrote to memory of 5080 3352 SystemSettingsRemoveDevice.exe PID 3352 wrote to memory of 5080 3352 SystemSettingsRemoveDevice.exe PID 3352 wrote to memory of 4532 3352 SystemSettingsRemoveDevice.exe PID 3352 wrote to memory of 4532 3352 SystemSettingsRemoveDevice.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bafc52288eff94557ec9acdde60f3dc0_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:884
-
C:\Windows\system32\bdeunlock.exeC:\Windows\system32\bdeunlock.exe1⤵PID:4580
-
C:\Users\Admin\AppData\Local\0zW\bdeunlock.exeC:\Users\Admin\AppData\Local\0zW\bdeunlock.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4784
-
C:\Windows\system32\LicensingUI.exeC:\Windows\system32\LicensingUI.exe1⤵PID:1344
-
C:\Users\Admin\AppData\Local\WTFSEbPg5\LicensingUI.exeC:\Users\Admin\AppData\Local\WTFSEbPg5\LicensingUI.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3104
-
C:\Windows\system32\SystemSettingsRemoveDevice.exeC:\Windows\system32\SystemSettingsRemoveDevice.exe1⤵PID:5080
-
C:\Users\Admin\AppData\Local\GWT2u8z\SystemSettingsRemoveDevice.exeC:\Users\Admin\AppData\Local\GWT2u8z\SystemSettingsRemoveDevice.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
990KB
MD50b22a916270a8d7bcde54f84b4d8d168
SHA1433ab183f32758f44877372587490f1d554ae100
SHA256b1b79cfa93315fdba285074f6b47bd2c81acbcbb399bd78739f438afa0c5f6df
SHA5124b2dc434b8f8297caa8b35214a9c83ed0854aef590b38d6f83753bd1cb11a13c6fa5abea6daea78016bc409042682dbb341ed52594817d0ba3208e8979c46d06
-
Filesize
279KB
MD5fef5d67150c249db3c1f4b30a2a5a22e
SHA141ca037b0229be9338da4d78244b4f0ea5a3d5f3
SHA256dcfdd67bf3244ff86cadaaea50b43cce5479014ea2021c0c2fb40b7c856e5603
SHA5124ded9ca87d9d30c31ab2baededaa6e26681741ea1742d80c318173536c643a01bc049e03a03c3b45b3cb8860464a855830e12e87670503e65eedcdd5e9b2d1e7
-
Filesize
1.2MB
MD549a39f98a186e7cb62c635ea0d248aea
SHA10a150d186c9304d38aa6a7e5ca70fb09f549aa6e
SHA256a06b8ad2805302e90f5465390a210fc9ab4c6bcc218ebf13f1810666f99fd8ad
SHA512d6f28159f20ea37a6af3912dbb9ebb67f97bccd5b28c5bf54d6de120a7cacea60becec8c397fa2204a265fd53d075f407b3ef9e7c8ec31e28252fc2bb5903ee8
-
Filesize
39KB
MD57853f1c933690bb7c53c67151cbddeb0
SHA1d47a1ad0ccba4c988c8ffc5cbf9636fd4f4fa6e6
SHA2569500731b2a3442f11dfd08a8adfe027e7f32ef5834c628eed4b78be74168470d
SHA512831993d610539d44422d769de6561a4622e1b9cb3d73253774b6cecabf57654a74cd88b4ebe20921585ea96d977225b9501f02a0f6a1fc7d2cad6824fd539304
-
Filesize
1.2MB
MD5c6a685d37e39fe1d2894c94a58f4bf7b
SHA14b68c7e22f0fc21dd2d5dacce3afa0fd4c03e63d
SHA256c76d24a8d9714af8773fe4d17d4ca77aecf783d0ad24da46bbf76c08dd9a9a4c
SHA51216f21dd374bcc36ae48d1eee178229b4a86bda84d820454bce6732770b7c0180fb6c94df1a478dc46c1176dedc6150098d8e060c42cc8ce34a2000c4d0bb45aa
-
Filesize
142KB
MD58b4abc637473c79a003d30bb9c7a05e5
SHA1d1cab953c16d4fdec2b53262f56ac14a914558ca
SHA2560e9eb89aa0df9bb84a8f11b0bb3e9d89905355de34c91508968b4cb78bc3f6c5
SHA5125a40c846c5b3a53ae09114709239d8238c322a7d3758b20ed3fc8e097fc1409f62b4990557c1192e894eabfa89741a9d88bd5175850d039b97dfdf380d1c6eeb
-
Filesize
1KB
MD59db583efcebb6cffaaf67327ac8122ad
SHA1ada3c9d017429923f2dd25205e827b2699cb6741
SHA25689fc0e94b5b48a890276e3476b4cba07ef77bbf5d90066396f781f10f22ba3c1
SHA512b2da87c1ba0a9151397229b74e1cbd504eea597e628601727d21fc5dc83e90960ddab85b26caeab4662a955a9d0942573d97a46ceefa40e8b198b001cacfee88