Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
211cf9ae6ca6a0e4a98dacd5eda8d14a_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
211cf9ae6ca6a0e4a98dacd5eda8d14a_JaffaCakes118.dll
-
Size
2.3MB
-
MD5
211cf9ae6ca6a0e4a98dacd5eda8d14a
-
SHA1
ef0761f5ae25b3dfdf9f57941134dd26924867f3
-
SHA256
b579608532ee7162cb68571b74d3b13838d6719133f75eaa6cb3c7a57bfe231f
-
SHA512
37810a5d53e9f846c2f7c76bb02d92fe58af6efe0f25e31f260f0ce4860df01ab7cd1128825323fef607731d0f6e57c2b7bc249b508f7cce0c39684a213347f3
-
SSDEEP
12288:/VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1gpE:2fP7fWsK5z9A+WGAW+V5SB6Ct4bnbg
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000002D90000-0x0000000002D91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesComputerName.exeBitLockerWizard.exepsr.exepid process 2772 SystemPropertiesComputerName.exe 556 BitLockerWizard.exe 1792 psr.exe -
Loads dropped DLL 7 IoCs
Processes:
SystemPropertiesComputerName.exeBitLockerWizard.exepsr.exepid process 1204 2772 SystemPropertiesComputerName.exe 1204 556 BitLockerWizard.exe 1204 1792 psr.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rcoehfpd = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\NATIVE~1\\LuHv7W\\BITLOC~1.EXE" -
Processes:
rundll32.exeSystemPropertiesComputerName.exeBitLockerWizard.exepsr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1152 rundll32.exe 1152 rundll32.exe 1152 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2712 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 2712 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 2712 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 2772 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 2772 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 2772 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 2216 1204 BitLockerWizard.exe PID 1204 wrote to memory of 2216 1204 BitLockerWizard.exe PID 1204 wrote to memory of 2216 1204 BitLockerWizard.exe PID 1204 wrote to memory of 556 1204 BitLockerWizard.exe PID 1204 wrote to memory of 556 1204 BitLockerWizard.exe PID 1204 wrote to memory of 556 1204 BitLockerWizard.exe PID 1204 wrote to memory of 2700 1204 psr.exe PID 1204 wrote to memory of 2700 1204 psr.exe PID 1204 wrote to memory of 2700 1204 psr.exe PID 1204 wrote to memory of 1792 1204 psr.exe PID 1204 wrote to memory of 1792 1204 psr.exe PID 1204 wrote to memory of 1792 1204 psr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\211cf9ae6ca6a0e4a98dacd5eda8d14a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵PID:2712
-
C:\Users\Admin\AppData\Local\ggL1Lqw\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\ggL1Lqw\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2772
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:2216
-
C:\Users\Admin\AppData\Local\Tvzl\BitLockerWizard.exeC:\Users\Admin\AppData\Local\Tvzl\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:556
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2700
-
C:\Users\Admin\AppData\Local\UEV\psr.exeC:\Users\Admin\AppData\Local\UEV\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD508a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
Filesize
80KB
MD5bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026
-
Filesize
1KB
MD5e694f7445b9aa8ff997f3dbd7605e12a
SHA1bad36e9044e53aa523a1eb9e440c396b6351d198
SHA2560a045c54f7362a1fd1776c8471c6fd7f71fcb3edd1e7cc7a1cdb164536d5c863
SHA51290d6c66217b0a83b4528d730ee51a5822c58f1f25e2812c9a9e6dc7c63764cf5a33f5f0aeeba2ca04c3232c7e9f7dc2a5e0fa5f2d4dfa4a70ca77f8371d339e4
-
Filesize
2.3MB
MD5034cb8c738350b04c89535e9ef65adb1
SHA1859b8b43a7f5ee09504cb8a88eda845bb55e6d1f
SHA25613e079777d3c8971829475738f203951a633ad0ea41c2a75d96e5e190dc518a0
SHA51296a27873b1a4e0a6b57b3c307b0ecc418883cdab0c7a992ba1f11afa71947f73c63ebf9ee6ac7f66564c938d3d1d8173c66b071767c1f721b1e990cf33d448c2
-
Filesize
2.3MB
MD56afb8737b69dd6bdda36539be90e0a9d
SHA1bce950f82aff7d91a49c3141af80b20f5a9cb572
SHA25648a54b412f3eeb87f867c3492cbfcac2508215826b6e4ff3c00b809c4ae01678
SHA512ecf3e43bc9a0d1de9d618ac88fffd65e925dd99705524b79989df2606d3bc5357fcb30ad5f1eae097bbcb3442456a8adb5790c5fa9686fa4ea40ba74fa704afe
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
2.3MB
MD5283aefe055aaac60fa9be461edb72085
SHA131b8f9c2813a1be6c8a1effc20ddbb0cff48df51
SHA256fcd6c75a007a7c46ccf5134f7d329d88d14b89091b9f64ac2271485a1e8914d7
SHA512f3b4785c124e90daccd9c7137d1543e3826d865d8e09e9cd7deeb5f27a81f628c832d5c4077a928e102bd2f2249c96f19f264aea987381881a6efe5b89a05c13