Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
c92e3efca093f668248b1296266083b3_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
c92e3efca093f668248b1296266083b3_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c92e3efca093f668248b1296266083b3
-
SHA1
3517fccb614a9acae54875fde47e75835f4c88ab
-
SHA256
e19ce29247123b0510e9008cfc58ebfc1f044a10d788b56ed1aaec774735d9db
-
SHA512
32b944dfd3c52e2b742ca82e14ebca4c7a2e441cb8f86ca9808f9d40b9f757afd4ea651291cabf0ed62beb646c092f3c553c8b5789b09207aa01561fe2af1455
-
SSDEEP
24576:+VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:+V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3416-4-0x0000000007CB0000-0x0000000007CB1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wusa.exeBitLockerWizard.exeSystemSettingsAdminFlows.exepid Process 4876 wusa.exe 3228 BitLockerWizard.exe 4832 SystemSettingsAdminFlows.exe -
Loads dropped DLL 3 IoCs
Processes:
wusa.exeBitLockerWizard.exeSystemSettingsAdminFlows.exepid Process 4876 wusa.exe 3228 BitLockerWizard.exe 4832 SystemSettingsAdminFlows.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vfaxdafbicozcso = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\Managed\\DOCUME~1\\1033\\YdNY\\BITLOC~1.EXE" -
Processes:
SystemSettingsAdminFlows.exewusa.exeBitLockerWizard.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsAdminFlows.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe -
Modifies registry class 1 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid Process 804 regsvr32.exe 804 regsvr32.exe 804 regsvr32.exe 804 regsvr32.exe 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3416 3416 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3416 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3416 wrote to memory of 4624 3416 95 PID 3416 wrote to memory of 4624 3416 95 PID 3416 wrote to memory of 4876 3416 96 PID 3416 wrote to memory of 4876 3416 96 PID 3416 wrote to memory of 1172 3416 97 PID 3416 wrote to memory of 1172 3416 97 PID 3416 wrote to memory of 3228 3416 98 PID 3416 wrote to memory of 3228 3416 98 PID 3416 wrote to memory of 4824 3416 99 PID 3416 wrote to memory of 4824 3416 99 PID 3416 wrote to memory of 4832 3416 100 PID 3416 wrote to memory of 4832 3416 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c92e3efca093f668248b1296266083b3_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:4624
-
C:\Users\Admin\AppData\Local\QuBdfV\wusa.exeC:\Users\Admin\AppData\Local\QuBdfV\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4876
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:1172
-
C:\Users\Admin\AppData\Local\EJo\BitLockerWizard.exeC:\Users\Admin\AppData\Local\EJo\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3228
-
C:\Windows\system32\SystemSettingsAdminFlows.exeC:\Windows\system32\SystemSettingsAdminFlows.exe1⤵PID:4824
-
C:\Users\Admin\AppData\Local\oOEDnvz\SystemSettingsAdminFlows.exeC:\Users\Admin\AppData\Local\oOEDnvz\SystemSettingsAdminFlows.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
1.2MB
MD5b18e5383900b9619a538a24d0f87fab1
SHA16b01409bcb3730ca18bff58e9920867477984caf
SHA2564f272078944363ef384f2d23dcb467e4e63bb374fd6a6014cde4c3f1f083e1a7
SHA51236af77a99282e41bc63d54b2dc0a0bf62ef6cc524933a8d73055357d46cd438cd90f16e08e85bfd562036ee9fdf89bcb0ae78022ee6ec9ea4fa1f3698ae704ed
-
Filesize
1.2MB
MD57f2d9e555fe1255fab430f7bf929d3fb
SHA17134f4f2705514b9cf5063558d50546056aebdb9
SHA256f6af0ac9fca2c612643db88cd5f82e7e0a578ee6e16f30da241c6acbb608dfbb
SHA51263355655e000f0b7cd7c26a36f78bce0c982390727a3433c7db9e58e9dc17505b98d6447aa12b2acf469cfe1a7140a474990bd91756c534943f4eafe43dcd489
-
Filesize
309KB
MD5e43499ee2b4cf328a81bace9b1644c5d
SHA1b2b55641f2799e3fdb3bea709c9532017bbac59d
SHA2563e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb
SHA51204823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b
-
Filesize
506KB
MD550adb2c7c145c729b9de8b7cf967dd24
SHA1a31757f08da6f95156777c1132b6d5f1db3d8f30
SHA256a7a2e7122d27308df37b7ab718ef3ac239e4216669f51331e34e205f59fb0aec
SHA512715b4c93e79e896da1cf86cf4455a84cba1aeac34b6fd72d2afdf203a2034f6f8fac1d6501f0dd277a17bd1d7ab73ddd1887e01a99f2d26f39efeb94d0aac9b0
-
Filesize
1.2MB
MD5acab7e7fa42825b942682ccdeb61864d
SHA1db8bb57efbeb708dff71f85c1d83268c862c7d35
SHA2566acfd4cd8f30432e889f9b1eed9ebf6797666d4ce982cafdf5c3132b2d2e4e26
SHA512c200290d2e4325c991547b6e5caa1e34a9aa71de3d72f968121192e8e68d4b29f2c76abeacf1386257be7762eb1b0a7725e10197d9542608961d7cf0577ecff7
-
Filesize
1KB
MD52cefb93d091b849718b8d944f897971e
SHA18183bb7c68dfe94fe57dcabcbebdebad2e7c95f8
SHA2562520f3050add58707046d0f7c8049b8b33106bc4e833a95f4f5143c64d72fb13
SHA5128435126dc0f079335480abc9b4dc660459c038ac60e4ea333c6dde1ca075cfea98ee45eeb093e7b523d293e88e3e329ad4252f972994c9356496e9c58fcae148