Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
a206030ef4a2be9cb767a15d62722e09_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
a206030ef4a2be9cb767a15d62722e09_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a206030ef4a2be9cb767a15d62722e09
-
SHA1
0385df49ad9737c157449e23c94077063ac761ca
-
SHA256
810703d8679c42fdc80712f3c968b5391fec1a07e64fb62f32ca480fa6517703
-
SHA512
302f3951ed1e68c72ed7a4dc2248da465b0a64c5bc6decb310cca78b182bf44bbd4531176806a1cc55dced86ff41fe232940a05dbaeb6c0f0f18e92dd50a3c70
-
SSDEEP
24576:KVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL81:KV8hf6STw1ZlQauvzSq01ICe6zvmG
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3536-4-0x0000000000B60000-0x0000000000B61000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Utilman.exeBitLockerWizard.exeApplicationFrameHost.exepid process 1652 Utilman.exe 4300 BitLockerWizard.exe 776 ApplicationFrameHost.exe -
Loads dropped DLL 3 IoCs
Processes:
Utilman.exeBitLockerWizard.exeApplicationFrameHost.exepid process 1652 Utilman.exe 4300 BitLockerWizard.exe 776 ApplicationFrameHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ehsiuzwuc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\7Y7SRQ~1\\BITLOC~1.EXE" -
Processes:
rundll32.exeUtilman.exeBitLockerWizard.exeApplicationFrameHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplicationFrameHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3536 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3536 wrote to memory of 5068 3536 Utilman.exe PID 3536 wrote to memory of 5068 3536 Utilman.exe PID 3536 wrote to memory of 1652 3536 Utilman.exe PID 3536 wrote to memory of 1652 3536 Utilman.exe PID 3536 wrote to memory of 3380 3536 BitLockerWizard.exe PID 3536 wrote to memory of 3380 3536 BitLockerWizard.exe PID 3536 wrote to memory of 4300 3536 BitLockerWizard.exe PID 3536 wrote to memory of 4300 3536 BitLockerWizard.exe PID 3536 wrote to memory of 2200 3536 ApplicationFrameHost.exe PID 3536 wrote to memory of 2200 3536 ApplicationFrameHost.exe PID 3536 wrote to memory of 776 3536 ApplicationFrameHost.exe PID 3536 wrote to memory of 776 3536 ApplicationFrameHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a206030ef4a2be9cb767a15d62722e09_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵
-
C:\Users\Admin\AppData\Local\qi6Vo3TI0\Utilman.exeC:\Users\Admin\AppData\Local\qi6Vo3TI0\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\KcPMcLBK\BitLockerWizard.exeC:\Users\Admin\AppData\Local\KcPMcLBK\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe1⤵
-
C:\Users\Admin\AppData\Local\Mo0KQrz\ApplicationFrameHost.exeC:\Users\Admin\AppData\Local\Mo0KQrz\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\KcPMcLBK\BitLockerWizard.exeFilesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
C:\Users\Admin\AppData\Local\KcPMcLBK\FVEWIZ.dllFilesize
1.2MB
MD54011258dba1b7494b18a4619d248ead8
SHA1a1acd176d3314325e2d0d152491df8b63068010b
SHA2562141b23f070e6ad63820e218a303d875c0e031526d873d57df2aeb76f7a077af
SHA51297f40c35278de7d5952d6e99b1b048b9f8864f5d2da419a2df5234629d7950a9cf9e02b62da254fe7eb01fd9b4708d1aebaef9d672098c2966f3519740c095a0
-
C:\Users\Admin\AppData\Local\Mo0KQrz\ApplicationFrameHost.exeFilesize
76KB
MD5d58a8a987a8dafad9dc32a548cc061e7
SHA1f79fc9e0ab066cad530b949c2153c532a5223156
SHA256cf58e424b86775e6f2354291052126a646f842fff811b730714dfbbd8ebc71a4
SHA51293df28b65af23a5f82124ba644e821614e2e2074c98dbb2bd7319d1dfe9e2179b9d660d7720913c79a8e7b2f8560440789ad5e170b9d94670589885060c14265
-
C:\Users\Admin\AppData\Local\Mo0KQrz\dxgi.dllFilesize
1.2MB
MD565ccc9dac11555ea4c78dd3c2843bd72
SHA198430c06976c93f5ad5c870ed9d070dbce4be9f9
SHA256445851c1900dfa768cec2307e1474fc88bb4365812959316d9fdec441a92f3af
SHA51296152d991b04e9d2ccd76eaca175ffc6f613d5745a2cde7fb4a0febaf02a1237fed7cc761b8f9a2f9adf601be8c3981531ed9f57a21fe986c6a586ca39360eb0
-
C:\Users\Admin\AppData\Local\qi6Vo3TI0\DUser.dllFilesize
1.2MB
MD5c80eb48c715172735cee88cbf895350d
SHA1c9e4da0e642338e0bd92a9fe3567a5b5b20319e9
SHA2566048f0fc5cd0c8e844bd1ee344b878b3a7687d10d8193a6ab5257addcb9fd6e2
SHA512112bdf4e1fa9d08aed0ec6239cd58cbb9c5803a5bacce51ec0baea41b69838a9a43aa676ca85c2d2a8db8eff02b0dc04a53ce56e9549c8c1fed60c9a1c77bc9a
-
C:\Users\Admin\AppData\Local\qi6Vo3TI0\Utilman.exeFilesize
123KB
MD5a117edc0e74ab4770acf7f7e86e573f7
SHA15ceffb1a5e05e52aafcbc2d44e1e8445440706f3
SHA256b5bc4fce58403ea554691db678e6c8c448310fe59990990f0e37cd4357567d37
SHA51272883f794ff585fe7e86e818d4d8c54fa9781cab6c3fac6f6956f58a016a91f676e70d14691cbe054ae7b7469c6b4783152fbb694e92b940d9e3595fe3f41d97
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Jbphew.lnkFilesize
1KB
MD586cc1cb1dd0038550a85fb8de96c8a33
SHA1b5d93b0783e63f42c849b5fa54c5428b6c8af754
SHA256e4f98b0165b6a477ad0c02853ce9aa70ac89eeb410895c3cbd956d090bc0519c
SHA512f4fd2b377cb8960b0f922670283d2a525fff6d808a8bd28ae68c2619fc3b3e112abc6d78d47a1acd20271191b7273d2c2d2d77c11fa0121dd498909132f4ce01
-
memory/776-86-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/776-83-0x000002A02B130000-0x000002A02B137000-memory.dmpFilesize
28KB
-
memory/1652-52-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/1652-49-0x00000209E5560000-0x00000209E5567000-memory.dmpFilesize
28KB
-
memory/1652-46-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/3536-34-0x0000000000560000-0x0000000000567000-memory.dmpFilesize
28KB
-
memory/3536-13-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-9-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-7-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-15-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-6-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-10-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-11-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-12-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-8-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-33-0x00007FFA0D5CA000-0x00007FFA0D5CB000-memory.dmpFilesize
4KB
-
memory/3536-4-0x0000000000B60000-0x0000000000B61000-memory.dmpFilesize
4KB
-
memory/3536-35-0x00007FFA0D7D0000-0x00007FFA0D7E0000-memory.dmpFilesize
64KB
-
memory/3536-36-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-24-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3536-14-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/4300-69-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/4300-66-0x000001D026500000-0x000001D026507000-memory.dmpFilesize
28KB
-
memory/4300-63-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/5020-39-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/5020-1-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/5020-0-0x000001C174A40000-0x000001C174A47000-memory.dmpFilesize
28KB