Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
d26885945eb4456891a98cf5150c51bb_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d26885945eb4456891a98cf5150c51bb_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
d26885945eb4456891a98cf5150c51bb
-
SHA1
2a51c4f78684aff8b1b4ee5831bc78276d7c0c02
-
SHA256
72a98167067dce07044af99248b5e58b14dcdad86d1e6e1a677014103bb08698
-
SHA512
aa8f8b39916d5ad5b0ed3fc278abb0912f899e85f333ed1772c87e104e7c5bbcda1251c2f16f4682c2b26f36228330f234264de60c8e88916c36dacecf916a76
-
SSDEEP
24576:juYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:N9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3404-4-0x0000000002BC0000-0x0000000002BC1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DWWIN.EXEmblctr.exeBitLockerWizard.exepid Process 3652 DWWIN.EXE 1212 mblctr.exe 4436 BitLockerWizard.exe -
Loads dropped DLL 3 IoCs
Processes:
DWWIN.EXEmblctr.exeBitLockerWizard.exepid Process 3652 DWWIN.EXE 1212 mblctr.exe 4436 BitLockerWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tdfoxulv = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ADMINI~1\\FZ9rwM\\mblctr.exe" -
Processes:
rundll32.exeDWWIN.EXEmblctr.exeBitLockerWizard.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 4656 rundll32.exe 4656 rundll32.exe 4656 rundll32.exe 4656 rundll32.exe 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 3404 3404 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3404 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3404 wrote to memory of 840 3404 89 PID 3404 wrote to memory of 840 3404 89 PID 3404 wrote to memory of 3652 3404 90 PID 3404 wrote to memory of 3652 3404 90 PID 3404 wrote to memory of 4496 3404 91 PID 3404 wrote to memory of 4496 3404 91 PID 3404 wrote to memory of 1212 3404 92 PID 3404 wrote to memory of 1212 3404 92 PID 3404 wrote to memory of 964 3404 93 PID 3404 wrote to memory of 964 3404 93 PID 3404 wrote to memory of 4436 3404 94 PID 3404 wrote to memory of 4436 3404 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26885945eb4456891a98cf5150c51bb_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵PID:840
-
C:\Users\Admin\AppData\Local\8HPCdV\DWWIN.EXEC:\Users\Admin\AppData\Local\8HPCdV\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3652
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:4496
-
C:\Users\Admin\AppData\Local\uaCFb\mblctr.exeC:\Users\Admin\AppData\Local\uaCFb\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1212
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:964
-
C:\Users\Admin\AppData\Local\xZb7\BitLockerWizard.exeC:\Users\Admin\AppData\Local\xZb7\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5444cc4d3422a0fdd45c1b78070026c60
SHA197162ff341fff1ec54b827ec02f8b86fd2d41a97
SHA2564b3f620272e709ce3e01ae5b19ef0300bd476f2da6412637f703bbaded2821f0
SHA51221742d330a6a5763ea41a8fed4d71b98e4a1b4c685675c4cfeb7253033c3a208c23902caf0efdf470a85e0770cb8fac8af0eb6d3a8511445b0570054b42d5553
-
Filesize
1.2MB
MD56043268b575781f5a0def839dcb2a303
SHA1e0a3237dd985b19059cfb7027526571de0511d81
SHA2566ce281f36b0e87d2da90658966e185b24109905bd09176a524661c572aedb079
SHA5124b0af7edcc972e97f7cd21fe63a7d035b9c6f05b923e42a51cf313a282387f96d43ca5ef8bf1954144c4cdd559359bd7c00152d4d4af02012a8dcd0ae7def43e
-
Filesize
1.2MB
MD5244eb765885b6600cf69097f947e4400
SHA15a856c379f03e670f909d7b6a856f4ac47c54b4e
SHA2567f9feabc9dbfc61454118cdb01ad685fa56d00b1d232c3f40243cc511d795eb6
SHA512063d9087878ca4b53990081bdc11fc0953d42a9561f7c30793505f209a29648f82e98a45846e7809a4938ec2bf8937abe4995620862b801526a6825ba505b1ef
-
Filesize
790KB
MD5d3db14eabb2679e08020bcd0c96fa9f6
SHA1578dca7aad29409634064579d269e61e1f07d9dd
SHA2563baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69
SHA51214dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
1.2MB
MD55f1f653a2cb3131ef565d3ea2c0d905f
SHA1a055e403617614a88ab39c3565d6a01e3f6d2943
SHA256b466febd4f4806f1dcbb22d288b0557b8ab4d57d45958e8bed8ef3b54e09620f
SHA5128687b0c2875a315cd7215a337907052a62d48fb2c0ddf90b05b6cd7cd8b0e78253e40f76b43ff15cc25e76118b264167f0ec8ec7a804668d6beaac7f205ad764
-
Filesize
1KB
MD52111b434eb8d84eafd21012ac05e2b63
SHA1becf32da3fea31b584d5606cb525c5f6b3908b59
SHA2562c79fb39730d7de13051868819e8138baafefc93223cd843a91402b5bcef70c2
SHA51255f748bda0992b6e009b6b036e4fe53b1ea84fa426a7ac885670275114b2bfff4f7c9dd0fa045dc6ab21476fddb3e4f825729691ceabcf7f945fa5f93886d5eb