Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
8edbc8966c7188e465581d36300c7352_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
8edbc8966c7188e465581d36300c7352_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
8edbc8966c7188e465581d36300c7352
-
SHA1
659416a2b57a6473f69f7ec5d31c8126f4e00ba5
-
SHA256
b85dc997c286d5e1c94c544310837a28f8b7376d5ff40fbf0af80af9cc43cc8f
-
SHA512
fc026ad358a33716ee1bab7f8ebe962c6b2350d3ce6f100c92d35ed69a6d2c6f8a4e95d9b59c1dfa9d00e8513dbd4cfef34df0b045344d8b08ec8820a6fb5d1f
-
SSDEEP
24576:fuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:h9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3432-4-0x0000000000EF0000-0x0000000000EF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2768 DevicePairingWizard.exe 4040 BitLockerWizard.exe 5076 wbengine.exe -
Loads dropped DLL 3 IoCs
pid Process 2768 DevicePairingWizard.exe 4040 BitLockerWizard.exe 5076 wbengine.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qebzqfuc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\Managed\\WORDDO~1\\GIMIOJ~1\\BITLOC~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4660 rundll32.exe 4660 rundll32.exe 4660 rundll32.exe 4660 rundll32.exe 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3432 Process not Found Token: SeCreatePagefilePrivilege 3432 Process not Found Token: SeShutdownPrivilege 3432 Process not Found Token: SeCreatePagefilePrivilege 3432 Process not Found Token: SeShutdownPrivilege 3432 Process not Found Token: SeCreatePagefilePrivilege 3432 Process not Found Token: SeShutdownPrivilege 3432 Process not Found Token: SeCreatePagefilePrivilege 3432 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3432 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3432 wrote to memory of 1660 3432 Process not Found 94 PID 3432 wrote to memory of 1660 3432 Process not Found 94 PID 3432 wrote to memory of 2768 3432 Process not Found 95 PID 3432 wrote to memory of 2768 3432 Process not Found 95 PID 3432 wrote to memory of 2460 3432 Process not Found 96 PID 3432 wrote to memory of 2460 3432 Process not Found 96 PID 3432 wrote to memory of 4040 3432 Process not Found 97 PID 3432 wrote to memory of 4040 3432 Process not Found 97 PID 3432 wrote to memory of 1940 3432 Process not Found 98 PID 3432 wrote to memory of 1940 3432 Process not Found 98 PID 3432 wrote to memory of 5076 3432 Process not Found 99 PID 3432 wrote to memory of 5076 3432 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8edbc8966c7188e465581d36300c7352_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:1660
-
C:\Users\Admin\AppData\Local\5F1IOQWz9\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\5F1IOQWz9\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2768
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:2460
-
C:\Users\Admin\AppData\Local\Cr5SBJ6QT\BitLockerWizard.exeC:\Users\Admin\AppData\Local\Cr5SBJ6QT\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4040
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵PID:1940
-
C:\Users\Admin\AppData\Local\EOJDVFAB3\wbengine.exeC:\Users\Admin\AppData\Local\EOJDVFAB3\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
Filesize
1.2MB
MD5c59499ff205795550a92b0fcfcc557a7
SHA1aa5fe54b181d43debb04e3f644b897bc8bac165d
SHA256642ea3d1e04965c553a7abad827ca28816875984b645409aa9908bf4322a505c
SHA512385c3fdb68c7c4caf39c2843d410634e14866c1c982f23e07bd1f41227accb7e635f849f24775d9a5f3afd9f7b494c54777c74e95cb3ebfa02dc1e70ad74b52d
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
1.2MB
MD51c6b9512c2130f5623a20392f0225f05
SHA16f6b0426c9c6d1fc8b7f61674c4318b0a724c815
SHA256f1e5e82a861696e0065492a6d4696129005981ed8d4520028364e1423e140a8c
SHA512cd705ab8ca17626c26bb985d2f0f8da8c6e0a57e258526ec32615553bd2ca606d7930ddf0da6edfcebe46192c235a02d028ee5121a8e9d9ab8b91a4cc84b8ad3
-
Filesize
1.2MB
MD515a7207e49d13236b071020a37410162
SHA18a860a7ded0035a335c33479d216508187232ff6
SHA25639d4997210a7d9337c5b3a98eae3e7e04bd4e14daaeb2f84dd3fb19c60d1773b
SHA512d84dd663b0e7a9ad0d1412e0427db850fa7f40086e67d02767b188b5e9f030ba22b46c14a470344c6293fa74040b9eb975397ac4b1774f6fb410bfac798cdb5a
-
Filesize
1.5MB
MD517270a354a66590953c4aac1cf54e507
SHA1715babcc8e46b02ac498f4f06df7937904d9798d
SHA2569954394b43783061f9290706320cc65597c29176d5b8e7a26fa1d6b3536832b4
SHA5126be0ba6be84d01ab47f5a4ca98a6b940c43bd2d1e1a273d41c3e88aca47da11d932024b007716d1a6ffe6cee396b0e3e6971ab2afc293e72472f2e61c17b2a89
-
Filesize
1KB
MD5ab7631ae8e33f3f6c74e2813ec2791ff
SHA12ca1e06b1fffaa72892b335d02935e5267d782cb
SHA256eb3467ab1d10140786d39341f4b8172aa8de758d2b05673e735583222fa8c334
SHA512c6698347a0bad3ab0c892252120bde1cba1afb2c98d9011687a30ffeef5bf6483cbe735f93d64c8dce007ac581cc67a44be30e06b5d7ef6484802b23a41ac4a9