Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
a236617cba1842bc67dd010ff75e0165_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
a236617cba1842bc67dd010ff75e0165_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a236617cba1842bc67dd010ff75e0165
-
SHA1
45c927cb4e54935e080eb289d6b3873599f326aa
-
SHA256
33143ae3dad7d48a7b60f534dda386fe9ca6451864b50facc77d50c41cb7d704
-
SHA512
fc2a47558586c1af2621d6eb12c0d1a418117f3291a04a8a4744e276514f71851d399da19cb7e873a0826c40e136b605cab83500447e89a7c476736164a02168
-
SSDEEP
24576:HuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N3:p9cKrUqZWLAcUv
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3456-4-0x00000000073D0000-0x00000000073D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
Processes:
mmc.exeie4uinit.exeSysResetErr.exeBitLockerWizard.exepid Process 2036 mmc.exe 1040 ie4uinit.exe 4024 SysResetErr.exe 4444 BitLockerWizard.exe -
Loads dropped DLL 5 IoCs
Processes:
mmc.exeie4uinit.exeSysResetErr.exeBitLockerWizard.exepid Process 2036 mmc.exe 1040 ie4uinit.exe 1040 ie4uinit.exe 4024 SysResetErr.exe 4444 BitLockerWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qebzqfuc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\ut7Qoh\\SysResetErr.exe" -
Processes:
SysResetErr.exeBitLockerWizard.exemmc.exeie4uinit.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4uinit.exe -
Modifies registry class 3 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid Process 4932 regsvr32.exe 4932 regsvr32.exe 4932 regsvr32.exe 4932 regsvr32.exe 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 Token: SeShutdownPrivilege 3456 Token: SeCreatePagefilePrivilege 3456 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3456 3456 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3456 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid Process procid_target PID 3456 wrote to memory of 4760 3456 97 PID 3456 wrote to memory of 4760 3456 97 PID 3456 wrote to memory of 2036 3456 98 PID 3456 wrote to memory of 2036 3456 98 PID 3456 wrote to memory of 1236 3456 99 PID 3456 wrote to memory of 1236 3456 99 PID 3456 wrote to memory of 1040 3456 100 PID 3456 wrote to memory of 1040 3456 100 PID 3456 wrote to memory of 5040 3456 101 PID 3456 wrote to memory of 5040 3456 101 PID 3456 wrote to memory of 4024 3456 102 PID 3456 wrote to memory of 4024 3456 102 PID 3456 wrote to memory of 1188 3456 103 PID 3456 wrote to memory of 1188 3456 103 PID 3456 wrote to memory of 4444 3456 104 PID 3456 wrote to memory of 4444 3456 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a236617cba1842bc67dd010ff75e0165_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵PID:4760
-
C:\Users\Admin\AppData\Local\1x5N\mmc.exeC:\Users\Admin\AppData\Local\1x5N\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2036
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵PID:1236
-
C:\Users\Admin\AppData\Local\OcesgAL\ie4uinit.exeC:\Users\Admin\AppData\Local\OcesgAL\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1040
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵PID:5040
-
C:\Users\Admin\AppData\Local\S4U\SysResetErr.exeC:\Users\Admin\AppData\Local\S4U\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4024
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Xfi\BitLockerWizard.exeC:\Users\Admin\AppData\Local\Xfi\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5215577c73de8051541de40fba42d3b90
SHA1603180cf8d783a7b29fc96548ce973fbaf4825a9
SHA256750a7c2d10737938b7aa42ec78489d325dc45bee06d4b544c01c536ab01f1fa4
SHA51245c635890b8eeff3a4c280ab2e71342593975539a3b84613777f4fc124a7d22b2a9eccc6ad064f909809a59ff2fed17c8254e6beed9fcd540ab425d86d65c63c
-
Filesize
1.8MB
MD58c86b80518406f14a4952d67185032d6
SHA19269f1fbcf65fefbc88a2e239519c21efe0f6ba5
SHA256895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a
SHA5121bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099
-
Filesize
1.2MB
MD5ff817064fb6f4a1e85b16938a331e3b7
SHA12529fbfdcbdd9ec859e54b332e8d1757a18ff224
SHA256bc809acf2b97be20b089953971c86af52ee6dc0c32ababb58f16cdafeac0700a
SHA5129dcaac3bf134f5c6300c49431394fd96e6d0995629b70cdbe24b6210dcd28707514f3f2fa2cab0aab67b16b3a1051efd13f994e8b1f7611e0f48b2144b76845b
-
Filesize
262KB
MD5a2f0104edd80ca2c24c24356d5eacc4f
SHA18269b9fd9231f04ed47419bd565c69dc677fab56
SHA2565d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c
SHA512e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390
-
Filesize
1.5MB
MD50d491677cfd06e131c26af691e47d20c
SHA101f7a1cb3dfa610a2c3eab37436407f9ca35ca98
SHA2564673f8b483b98a651d2dd813c396754bc4aa61c72587f386b7cbf467886ee81f
SHA51245ab38af93ab22d311d46c7dd700bbe7cb6c24bb411709779bbb498af20383f8439ec82f85813650bf791b6aa9f61710d3cda9d1216c4390c294b0f54ca02b71
-
Filesize
41KB
MD5090c6f458d61b7ddbdcfa54e761b8b57
SHA1c5a93e9d6eca4c3842156cc0262933b334113864
SHA256a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd
SHA512c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
1.2MB
MD5c1038cba489cae1c5ceec90ff25da415
SHA12940598de89bb7cef95dc24452e9f4c03b529c92
SHA2565d1190e86c9223fe35b965d4ed79eb1d60a90ce2b856a99e229aec8bbf059e72
SHA51248fcb7772fef0eda4823eee484044fe5c040b04902baf3f1a8905260fc3aae3e48cc85f8991cb1581a1eed230c00a01b209d070ccee2884d8580f6d36eebb754
-
Filesize
1021B
MD5b8612b90af3407a716f2f8cf56890d95
SHA177df2330dcb20c5ea1512d6daacd7e97d068d87a
SHA256dea1ee2a4ad0dab3e4b71072612bb637654e44b0be926558a059ceaf60770c11
SHA512e5716e3f9cef5aedf520a6a92fca750e181293977d10ac91a8033e654c879c6cd88ac0080df3a99ce5520fd31f21148be0fa87f73623972704181b125f075c84