Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
bc26b565bcd6a66c51368a58f663d94b_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
bc26b565bcd6a66c51368a58f663d94b_JaffaCakes118.dll
-
Size
1.6MB
-
MD5
bc26b565bcd6a66c51368a58f663d94b
-
SHA1
95d83abdaca04ba954e3fde7088422a3cd2622e4
-
SHA256
5f4efeb2f3136e117f51044a6122e1089daae2908d27492dbec3094b6719fa58
-
SHA512
b7eae94f31e4696e42ebf457aee957a2787ea07abb1b1dac3fcdedb8495e5f588c709f75134519c285f6162cfc1f6dcbe11f285a71e7d140d3f6193b4b04477c
-
SSDEEP
24576:WuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:W9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000002D70000-0x0000000002D71000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WFS.exeosk.exerekeywiz.exepid process 2208 WFS.exe 2180 osk.exe 2764 rekeywiz.exe -
Loads dropped DLL 7 IoCs
Processes:
WFS.exeosk.exerekeywiz.exepid process 1204 2208 WFS.exe 1204 2180 osk.exe 1204 2764 rekeywiz.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yyeybzteybdsbj = "C:\\Users\\Admin\\AppData\\Roaming\\MEDIAC~1\\xbKXV\\osk.exe" -
Processes:
rundll32.exeWFS.exeosk.exerekeywiz.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2204 rundll32.exe 2204 rundll32.exe 2204 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2448 1204 WFS.exe PID 1204 wrote to memory of 2448 1204 WFS.exe PID 1204 wrote to memory of 2448 1204 WFS.exe PID 1204 wrote to memory of 2208 1204 WFS.exe PID 1204 wrote to memory of 2208 1204 WFS.exe PID 1204 wrote to memory of 2208 1204 WFS.exe PID 1204 wrote to memory of 2908 1204 osk.exe PID 1204 wrote to memory of 2908 1204 osk.exe PID 1204 wrote to memory of 2908 1204 osk.exe PID 1204 wrote to memory of 2180 1204 osk.exe PID 1204 wrote to memory of 2180 1204 osk.exe PID 1204 wrote to memory of 2180 1204 osk.exe PID 1204 wrote to memory of 2512 1204 rekeywiz.exe PID 1204 wrote to memory of 2512 1204 rekeywiz.exe PID 1204 wrote to memory of 2512 1204 rekeywiz.exe PID 1204 wrote to memory of 2764 1204 rekeywiz.exe PID 1204 wrote to memory of 2764 1204 rekeywiz.exe PID 1204 wrote to memory of 2764 1204 rekeywiz.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc26b565bcd6a66c51368a58f663d94b_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\x2gtr\WFS.exeC:\Users\Admin\AppData\Local\x2gtr\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵
-
C:\Users\Admin\AppData\Local\2mWVwH\osk.exeC:\Users\Admin\AppData\Local\2mWVwH\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵
-
C:\Users\Admin\AppData\Local\qNIR\rekeywiz.exeC:\Users\Admin\AppData\Local\qNIR\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\2mWVwH\WMsgAPI.dllFilesize
1.6MB
MD5f9574d335d53896730158d270e96b9cf
SHA1f116aed8d82a64d7b3acec2c70b2db61c1c7062c
SHA256db5162c75b2f08a99bf7a54a6a08286f3bf034bf901aed5e1ad40a8de651a3a8
SHA512c1679a9e7a29283f305637bb50e39b22627b50652f3b6e6ed493294eedbb230b8b692f20a8cf6c1dab9f7c649a51684c869da9060f2e53c0ea8f8c9522ed7f34
-
C:\Users\Admin\AppData\Local\qNIR\slc.dllFilesize
1.6MB
MD5ba50c0f610c80c2fad31069856d28007
SHA1517fce335cb06b327a7ffd520fd9ad83f322d273
SHA25650f94b67537701fd318a1b8e4fc06a219c315d98f91380041fe0f55ce02287ce
SHA512ccf18b3738fac39caeb0ac287fd8144b0aa5129cb90aba3e4e62cfbbe72c9566cbcdb9a43fbcc80e356bb666df5dfdf2e92adfa30a8b35af23df1c391bbdf288
-
C:\Users\Admin\AppData\Local\x2gtr\credui.dllFilesize
1.6MB
MD53d316cf6b8430c1e76d00aa710e68fc4
SHA125e7401031958540143b1481e5ed80b7f026f7c8
SHA2566f3e01412c11f481f31a1424f661cc86351fb0d18eea98a2e55463363fcbee9b
SHA5127ecc86dbc34d019a7bd50ffe3f71687419eb081801b1546f4009b042c1020118d5dfeea0cb5cbd1e26965be404d4d9602d604f02be8867280fa1a231c1f6607c
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Omdqupblcei.lnkFilesize
1KB
MD5849ff865465bcfb7d6e3e57034c90a8f
SHA182060b124abc127af9b5a38136ea1b2608552409
SHA256077a23747083f2e3fcdbc4363d2459a11d021c324135879da868f1d83b5e7f39
SHA5129c8e02e13faab5cb0727e6894662d8f212d0305428df94272648e99973c84252daf84cddea1a21610923e9ec8b95bada566cbed8a5b507ed7028822652f41587
-
\Users\Admin\AppData\Local\2mWVwH\osk.exeFilesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1
-
\Users\Admin\AppData\Local\qNIR\rekeywiz.exeFilesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
\Users\Admin\AppData\Local\x2gtr\WFS.exeFilesize
951KB
MD5a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
memory/1204-15-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-39-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-11-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-12-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-23-0x0000000002B50000-0x0000000002B57000-memory.dmpFilesize
28KB
-
memory/1204-29-0x0000000077491000-0x0000000077492000-memory.dmpFilesize
4KB
-
memory/1204-28-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-19-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-18-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-17-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-16-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-4-0x0000000077286000-0x0000000077287000-memory.dmpFilesize
4KB
-
memory/1204-13-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-32-0x0000000077620000-0x0000000077622000-memory.dmpFilesize
8KB
-
memory/1204-40-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-10-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-5-0x0000000002D70000-0x0000000002D71000-memory.dmpFilesize
4KB
-
memory/1204-9-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-8-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-7-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-14-0x0000000140000000-0x00000001401A1000-memory.dmpFilesize
1.6MB
-
memory/1204-67-0x0000000077286000-0x0000000077287000-memory.dmpFilesize
4KB
-
memory/2180-78-0x0000000000130000-0x0000000000137000-memory.dmpFilesize
28KB
-
memory/2180-81-0x000007FEF60B0000-0x000007FEF6252000-memory.dmpFilesize
1.6MB
-
memory/2204-48-0x000007FEF60B0000-0x000007FEF6251000-memory.dmpFilesize
1.6MB
-
memory/2204-3-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2204-0-0x000007FEF60B0000-0x000007FEF6251000-memory.dmpFilesize
1.6MB
-
memory/2208-62-0x000007FEF60B0000-0x000007FEF6252000-memory.dmpFilesize
1.6MB
-
memory/2208-59-0x00000000001B0000-0x00000000001B7000-memory.dmpFilesize
28KB
-
memory/2208-57-0x000007FEF60B0000-0x000007FEF6252000-memory.dmpFilesize
1.6MB
-
memory/2764-93-0x000007FEF5EA0000-0x000007FEF6042000-memory.dmpFilesize
1.6MB
-
memory/2764-98-0x000007FEF5EA0000-0x000007FEF6042000-memory.dmpFilesize
1.6MB