Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
28/07/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
15410936b47cef7dec131527c79b6f17_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
15410936b47cef7dec131527c79b6f17_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
15410936b47cef7dec131527c79b6f17
-
SHA1
34f01700b66c8e13d358c5ef4d93a3b15a7a0cb1
-
SHA256
5267301c0c47dcaaa430b438ee7498235950f67cbcb1042dc0a69a9912a736ee
-
SHA512
13116d07c0e0aacff8ac9358b1e634f81ae0b8101c49b25f2a66b2cac4b672eb0c8d5238ca7d8df50fc159d839dd33f16e7887fc1f6b0fef6f02365f2a20bf3e
-
SSDEEP
24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:G9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3436-4-0x0000000002E20000-0x0000000002E21000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 4612 BitLockerWizardElev.exe 1788 MoUsoCoreWorker.exe 3352 bdeunlock.exe -
Loads dropped DLL 3 IoCs
pid Process 4612 BitLockerWizardElev.exe 1788 MoUsoCoreWorker.exe 3352 bdeunlock.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2951562807-3718269429-4208157415-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Goapzkqheixslx = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\NATIVE~1\\Gk5\\MOUSOC~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MoUsoCoreWorker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdeunlock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4828 rundll32.exe 4828 rundll32.exe 4828 rundll32.exe 4828 rundll32.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3436 wrote to memory of 1480 3436 Process not Found 84 PID 3436 wrote to memory of 1480 3436 Process not Found 84 PID 3436 wrote to memory of 4612 3436 Process not Found 85 PID 3436 wrote to memory of 4612 3436 Process not Found 85 PID 3436 wrote to memory of 4960 3436 Process not Found 86 PID 3436 wrote to memory of 4960 3436 Process not Found 86 PID 3436 wrote to memory of 1788 3436 Process not Found 87 PID 3436 wrote to memory of 1788 3436 Process not Found 87 PID 3436 wrote to memory of 3908 3436 Process not Found 88 PID 3436 wrote to memory of 3908 3436 Process not Found 88 PID 3436 wrote to memory of 3352 3436 Process not Found 89 PID 3436 wrote to memory of 3352 3436 Process not Found 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15410936b47cef7dec131527c79b6f17_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵PID:1480
-
C:\Users\Admin\AppData\Local\cZ1IfRy\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\cZ1IfRy\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4612
-
C:\Windows\system32\MoUsoCoreWorker.exeC:\Windows\system32\MoUsoCoreWorker.exe1⤵PID:4960
-
C:\Users\Admin\AppData\Local\I85290p\MoUsoCoreWorker.exeC:\Users\Admin\AppData\Local\I85290p\MoUsoCoreWorker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1788
-
C:\Windows\system32\bdeunlock.exeC:\Windows\system32\bdeunlock.exe1⤵PID:3908
-
C:\Users\Admin\AppData\Local\ihmd\bdeunlock.exeC:\Users\Admin\AppData\Local\ihmd\bdeunlock.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD547c6b45ff22b73caf40bb29392386ce3
SHA17e29a8d98fbb9b02d3d22e3576f4fd61ab50ffe9
SHA256cbccb642725edb42e749e26ded68a16b3aa20e291a1a7793a2d4efebb75f99c0
SHA512c919ab84a497616e7969d58c251f4e6efc337b41ef6956864b86d66ae1437294c124232fec54433eab3a6518ed529f8445dd0b23706b2f42f3fa42e69711f331
-
Filesize
1.2MB
MD5643f0a79bab95a4c49743e9249ecd575
SHA17d5acaa2b7158fc88b179882dfe4ab54e8a711e6
SHA256b49a86ae37967ad4a2b92210ded82a5de67100854765b15205921ccd14d31a65
SHA51247aa844addebf3cd9462f962266701b5020552efe7ff038b88943461e2d08159315d7a5cd09221812ce6297a7165a24a34491fc5b82a006e1c9ed05340228a3c
-
Filesize
100KB
MD58ac5a3a20cf18ae2308c64fd707eeb81
SHA131f2f0bdc2eb3e0d2a6cd626ea8ed71262865544
SHA256803eb37617d450704766cb167dc9766e82102a94940a26a988ad26ab8be3f2f5
SHA51285d0e28e4bffec709f26b2f0d20eb76373134af43bcaa70b97a03efa273b77dd4fbd4f6ee026774ce4029ab5a983aea057111efcd234ab1686a9bd0f7202748b
-
Filesize
1.2MB
MD5000a530bdbe1ad5cf094bb5b5fc9a562
SHA1ad96b8a36be06cb3ce65df47c73350fc2003d8e6
SHA2565fd62540c89f7c7d7a625a0a5fc6c7dfe1ef848cfaca9e473ac44c7fe00d4d78
SHA51244b0d5f350f116d54edd7adc9c42c9d38f5c07a64bf9c5c725ca443efd1cfa74b0394fec1e4b295a89cfd4164a82eb2a8c2d4df1ab539b19274e528b22bdc9d7
-
Filesize
1.2MB
MD53f8c428091d4f081a82dad0c67814058
SHA1dd1449b096e737dc03c11d699d97375180fd1e4b
SHA2567eaf10e5ef9b8b4cfa8b580e9a1e3542ded8e65395658146484e1774a2bf4a2a
SHA512557b4f226a2f1fdc626b0959c339ea7202d00f45727c7ac89445ffd6277d770fe84c52676c7a55492da6596b46c74b3da5cfca2ab2e64e8ac3c09d42ec994a9b
-
Filesize
279KB
MD5fef5d67150c249db3c1f4b30a2a5a22e
SHA141ca037b0229be9338da4d78244b4f0ea5a3d5f3
SHA256dcfdd67bf3244ff86cadaaea50b43cce5479014ea2021c0c2fb40b7c856e5603
SHA5124ded9ca87d9d30c31ab2baededaa6e26681741ea1742d80c318173536c643a01bc049e03a03c3b45b3cb8860464a855830e12e87670503e65eedcdd5e9b2d1e7
-
Filesize
1KB
MD5fc092c9dad427b294edad3430d2d5778
SHA1e173221ebbddfb75d972fe92787085e3b2d5564b
SHA2569d850133303b9326f9762dca2a47877ef17db9050e819284f79566e41bd28ba6
SHA512c17895d9ac5f4eb9c7c32074eb08581215626c7b092bc4d93228e6f6681b8cdafdd6cfdd8877392abbf59cb56cd6c75feb941b1c4caf27bd55eb7c485e96edeb