Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
a32e85a3e9c4f38f9b6bc91063dd086c_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
a32e85a3e9c4f38f9b6bc91063dd086c_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a32e85a3e9c4f38f9b6bc91063dd086c
-
SHA1
207a0c9c977e931bd533ec62761e9ecee2238ddf
-
SHA256
9cf326ccaee343e0bd17b36bc073ea0ec4db6dc32f1596d69f018f67f3f30055
-
SHA512
e1b749cbaec8b8b2f47f9376b2c88eab169735b7516d38ec388c7a54f637293d9adc7784a42b41d780ede176697b2d7f0fcc7df1405e15fead901232dedfa2de
-
SSDEEP
24576:9uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:X9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3464-4-0x00000000077F0000-0x00000000077F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
BitLockerWizard.exeperfmon.exeTaskmgr.exepid Process 1764 BitLockerWizard.exe 4676 perfmon.exe 1268 Taskmgr.exe -
Loads dropped DLL 4 IoCs
Processes:
BitLockerWizard.exeperfmon.exeTaskmgr.exepid Process 1764 BitLockerWizard.exe 4676 perfmon.exe 1268 Taskmgr.exe 1268 Taskmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qebzqfuc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-523280732-2327480845-3730041215-1000\\OjU9\\perfmon.exe" -
Processes:
BitLockerWizard.exeperfmon.exeTaskmgr.exerundll32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Taskmgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 3 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1444 rundll32.exe 1444 rundll32.exe 1444 rundll32.exe 1444 rundll32.exe 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3464 3464 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3464 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3464 wrote to memory of 1724 3464 95 PID 3464 wrote to memory of 1724 3464 95 PID 3464 wrote to memory of 1764 3464 96 PID 3464 wrote to memory of 1764 3464 96 PID 3464 wrote to memory of 4584 3464 97 PID 3464 wrote to memory of 4584 3464 97 PID 3464 wrote to memory of 4676 3464 98 PID 3464 wrote to memory of 4676 3464 98 PID 3464 wrote to memory of 4364 3464 99 PID 3464 wrote to memory of 4364 3464 99 PID 3464 wrote to memory of 1268 3464 100 PID 3464 wrote to memory of 1268 3464 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a32e85a3e9c4f38f9b6bc91063dd086c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:1724
-
C:\Users\Admin\AppData\Local\mRm6vkhDz\BitLockerWizard.exeC:\Users\Admin\AppData\Local\mRm6vkhDz\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1764
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:4584
-
C:\Users\Admin\AppData\Local\KxbnC\perfmon.exeC:\Users\Admin\AppData\Local\KxbnC\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4676
-
C:\Windows\system32\Taskmgr.exeC:\Windows\system32\Taskmgr.exe1⤵PID:4364
-
C:\Users\Admin\AppData\Local\yw7\Taskmgr.exeC:\Users\Admin\AppData\Local\yw7\Taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5da7c25c6f2bbb171687375abbe9b6bba
SHA1e106cd0f49d1558fc4591c23195c57235634e450
SHA256972320c520ae19dbc0d5ea350cab556103e40966c3d7a29ebf3f96191ac5d938
SHA512093f1c5657eb16ccb96d07f61ffa8afb20a7e64fd8490352a18482e8b34ce65c32bf56032a2bb30dc68b153e0b466046b1e6719043007dde056d9e25a9fd4ccf
-
Filesize
177KB
MD5d38aa59c3bea5456bd6f95c73ad3c964
SHA140170eab389a6ba35e949f9c92962646a302d9ef
SHA2565f041cff346fb37e5c5c9dab3c1272c76f8b5f579205170e97d2248d04a4ea0c
SHA51259fa552a46e5d6237c7244b03d09d60e9489217b4319a212e822c73fe1f31a81837cb906ae7da92072bd3d9263fe0b967e073110ba81da3a90126f25115fff68
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
1.2MB
MD5782c063c3f8abb72670dc6ad81b5821a
SHA179c62d71fa2bdc23faf2de52f1b8a75d2ef22ac3
SHA2560d6188f167941fdf1024e1dc6c8928c8794d017ba6c97452efafb529333d417c
SHA51293f02675e9a61fe1bf45eba3fcd33edbedf6d0bdd9b479110dc6e90b3ec9e28a85fbb147b3dfbb222dd147160fa813d4d2ac1cb089da6cb4513da1542848d54c
-
Filesize
1.2MB
MD558d5bc7895f7f32ee308e34f06f25dd5
SHA17a7f5e991ddeaf73e15a0fdcb5c999c0248a2fa4
SHA2564e305198f15bafd5728b5fb8e7ff48d9f312399c744ecfea0ecac79d93c5e478
SHA512872c84c92b0e4050ae4a4137330ec3cda30008fd15d6413bf7a913c03a021ad41b6131e5a7356b374ced98d37ae207147ebefd93893560dc15c3e9875f93f7a9
-
Filesize
1.2MB
MD5a95f03b1724a55dfcd2b019d43661126
SHA156a713467f8e88c2892bb1d52961d3b76879896a
SHA2566acf7b7d5d981069901fd23e7c8598032a114c24c607d8971a19281b03ced3b7
SHA5127baa8bf2db5b42ef08623b7136aef45f66715732c2f564f01e97ec93bef4aac0be24ed09861d983257935cb0f935d43d411e305d0968e661c7ca299d3a366fdf
-
Filesize
1KB
MD55b4779c4f858171ebb623c3267865217
SHA12dce27e88dc5452a90cf808c2e529cb91021433a
SHA2569c66f5f84a3338e564a6472e37d50653d5c1cf772ca00651bceedf03bc3073be
SHA512d46c910170ef237416f3aa41ec3e3da1198a68c7dfc503c0c2d1cbeabd8b9a4f4772fd340eb402c0238f5c6a862f801819dd5ac9cd61da826c8ad1d035137f98