Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
f215b4fabb14768f115195da3c9dad3a_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
f215b4fabb14768f115195da3c9dad3a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f215b4fabb14768f115195da3c9dad3a
-
SHA1
8977086bad5f310504bf0c61f36f096f2cb7644b
-
SHA256
c4a179d204f7bb7c4f82d2c0878c3f5cb9ca17fb519dd3b7447e4c3c5b327019
-
SHA512
d88438ee561f9d21017f2099b915cf4b5fd4f03b58bf8b139b721b558f41f061b923e564c5fbb9570c5c1337b986810df91de4a7bb2b7dc160c5c5f6022681ca
-
SSDEEP
24576:AuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Nfpt:Q9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002E90000-0x0000000002E91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
UI0Detect.exewbengine.exelpksetup.exepid process 2876 UI0Detect.exe 1832 wbengine.exe 1272 lpksetup.exe -
Loads dropped DLL 7 IoCs
Processes:
UI0Detect.exewbengine.exelpksetup.exepid process 1192 2876 UI0Detect.exe 1192 1832 wbengine.exe 1192 1272 lpksetup.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Auwqk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\TaskBar\\KQAYXC~1\\wbengine.exe" -
Processes:
rundll32.exeUI0Detect.exewbengine.exelpksetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2508 rundll32.exe 2508 rundll32.exe 2508 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 2628 1192 UI0Detect.exe PID 1192 wrote to memory of 2628 1192 UI0Detect.exe PID 1192 wrote to memory of 2628 1192 UI0Detect.exe PID 1192 wrote to memory of 2876 1192 UI0Detect.exe PID 1192 wrote to memory of 2876 1192 UI0Detect.exe PID 1192 wrote to memory of 2876 1192 UI0Detect.exe PID 1192 wrote to memory of 2664 1192 wbengine.exe PID 1192 wrote to memory of 2664 1192 wbengine.exe PID 1192 wrote to memory of 2664 1192 wbengine.exe PID 1192 wrote to memory of 1832 1192 wbengine.exe PID 1192 wrote to memory of 1832 1192 wbengine.exe PID 1192 wrote to memory of 1832 1192 wbengine.exe PID 1192 wrote to memory of 1488 1192 lpksetup.exe PID 1192 wrote to memory of 1488 1192 lpksetup.exe PID 1192 wrote to memory of 1488 1192 lpksetup.exe PID 1192 wrote to memory of 1272 1192 lpksetup.exe PID 1192 wrote to memory of 1272 1192 lpksetup.exe PID 1192 wrote to memory of 1272 1192 lpksetup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f215b4fabb14768f115195da3c9dad3a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵PID:2628
-
C:\Users\Admin\AppData\Local\w4gZStXK\UI0Detect.exeC:\Users\Admin\AppData\Local\w4gZStXK\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2876
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵PID:2664
-
C:\Users\Admin\AppData\Local\0H1wE\wbengine.exeC:\Users\Admin\AppData\Local\0H1wE\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1832
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵PID:1488
-
C:\Users\Admin\AppData\Local\y8mhcXe\lpksetup.exeC:\Users\Admin\AppData\Local\y8mhcXe\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD541ce6ee7a540676a8428ff8c8328764f
SHA137b689212ec870ef6eeb2bbdfec59ae59d764e57
SHA256a9bd4ffb8e4b5a9665008e75cf0673cf283ffb47d055a5c46a345a01aaf423cc
SHA512326eee92763ffea4c1b6220dc53ba09c9b71d6fd66157e41e5808971800a567bd6a39ce7dc42fc54eafcaedfabd67c7bd3b974e6e15b015116a80969189de6e0
-
Filesize
1.2MB
MD58f437b49a9a1bd67da877eec1f52e1e8
SHA1a6475a6eacbdae88dba3b823dc38c126c3cb6e6e
SHA25677d53d6bac23ca080d32a39a1042b5e0f81730f071f1e63ade28cf4e964ade5d
SHA51298bb3c8f061257c1960c47093d4c39366967dea1248fbd1a8373b44e7933fa757358c74b184d4f848a6908ee93e36ad1195254e21e7ec9f9ba89562c8f0bdf7a
-
Filesize
1.2MB
MD522e15fc9521480461aa2ea9ef4e2b489
SHA1c3b92104e82a8cf9a2c8a7c61e86bef9d8127647
SHA256966fcf3b3161ff4edf63ba21efaf275e31e528fd02b18372035e00d6e5f0230a
SHA512a2dcad6f496e1cc0bdd263a14b62cfd6730d87117006101ac0807ee668bb7c153b77355456125abcec4761018eb9496592f2d52e60f5250ea4c6f67216359adc
-
Filesize
1KB
MD521c6468576fa03d701a08b8c2cf6fa3a
SHA1abdd87b9f658d2072ed42f1d5ce324e08896294f
SHA25623f5495f9534f8a61e7187cdaaa195c0d64096a0ab6256621e56d6e53ecd5f13
SHA512a16030c4e6be18b9c55957ac789e9afd0c1ccfea2d993665ac6a205a9648a595e8fb8cf9de130cbd9b18dc8eeb80c65336b560883f08d07452e85107d09466e8
-
Filesize
1.4MB
MD578f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2
-
Filesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
Filesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861