Analysis
-
max time kernel
149s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:08
Static task
static1
Behavioral task
behavioral1
Sample
5d1acece864918cd32674b53b03b2782_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
5d1acece864918cd32674b53b03b2782_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
5d1acece864918cd32674b53b03b2782
-
SHA1
63818c48ec06eb1844c8a40bf931059664ec7473
-
SHA256
277cfe89b173e55243afc85867c0ccdf81b40800db1f16499c09544981a9ecfe
-
SHA512
d5024bb54815dc3162cda4bc5bfe81d8edc9f9356ee99de35ff17f01492c5e69026cc9ac31611719283b0e1ec3209501669b4b543ce4e6a9c275ca81b93845fa
-
SSDEEP
24576:vyTonNVlKTt/Q5ECvVP7hpJMvjtKpvPf9+m6kLRqgSyI:vyWRKTt/QlPVp3h9
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3440-4-0x0000000002E70000-0x0000000002E71000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
usocoreworker.exeMoUsoCoreWorker.exeperfmon.exepid process 2608 usocoreworker.exe 3416 MoUsoCoreWorker.exe 956 perfmon.exe -
Loads dropped DLL 3 IoCs
Processes:
usocoreworker.exeMoUsoCoreWorker.exeperfmon.exepid process 2608 usocoreworker.exe 3416 MoUsoCoreWorker.exe 956 perfmon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kjdyleps = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\n2JCoVtU6R\\MoUsoCoreWorker.exe" -
Processes:
rundll32.exeusocoreworker.exeMoUsoCoreWorker.exeperfmon.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA usocoreworker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MoUsoCoreWorker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3440 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3440 wrote to memory of 440 3440 usocoreworker.exe PID 3440 wrote to memory of 440 3440 usocoreworker.exe PID 3440 wrote to memory of 2608 3440 usocoreworker.exe PID 3440 wrote to memory of 2608 3440 usocoreworker.exe PID 3440 wrote to memory of 2768 3440 MoUsoCoreWorker.exe PID 3440 wrote to memory of 2768 3440 MoUsoCoreWorker.exe PID 3440 wrote to memory of 3416 3440 MoUsoCoreWorker.exe PID 3440 wrote to memory of 3416 3440 MoUsoCoreWorker.exe PID 3440 wrote to memory of 116 3440 perfmon.exe PID 3440 wrote to memory of 116 3440 perfmon.exe PID 3440 wrote to memory of 956 3440 perfmon.exe PID 3440 wrote to memory of 956 3440 perfmon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d1acece864918cd32674b53b03b2782_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\usocoreworker.exeC:\Windows\system32\usocoreworker.exe1⤵
-
C:\Users\Admin\AppData\Local\1CWkmyZ\usocoreworker.exeC:\Users\Admin\AppData\Local\1CWkmyZ\usocoreworker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\MoUsoCoreWorker.exeC:\Windows\system32\MoUsoCoreWorker.exe1⤵
-
C:\Users\Admin\AppData\Local\G4dxYUNg\MoUsoCoreWorker.exeC:\Users\Admin\AppData\Local\G4dxYUNg\MoUsoCoreWorker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵
-
C:\Users\Admin\AppData\Local\0D0r\perfmon.exeC:\Users\Admin\AppData\Local\0D0r\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0D0r\credui.dllFilesize
1.2MB
MD59c948924a0aa25c11185490efd93431c
SHA14afa19fa7ecacaf033eb77ef6d1a4c91b3f7adf9
SHA2566dc5e5659e8f0af7f061a61aad65e885dbf62f731924c30512e8b56a5b4f6e5f
SHA512f72753f4419e1027f9625951fa9fb34c8e16ba7a7c474a5c06c3039d3637d100d859608b00b51cb07760568a63e5ce6a64d7282783d42d70a8c5e6a6988a7d34
-
C:\Users\Admin\AppData\Local\0D0r\perfmon.exeFilesize
177KB
MD5d38aa59c3bea5456bd6f95c73ad3c964
SHA140170eab389a6ba35e949f9c92962646a302d9ef
SHA2565f041cff346fb37e5c5c9dab3c1272c76f8b5f579205170e97d2248d04a4ea0c
SHA51259fa552a46e5d6237c7244b03d09d60e9489217b4319a212e822c73fe1f31a81837cb906ae7da92072bd3d9263fe0b967e073110ba81da3a90126f25115fff68
-
C:\Users\Admin\AppData\Local\1CWkmyZ\XmlLite.dllFilesize
1.2MB
MD52a6d4f1a881018a25d2bde0d03741818
SHA1f2d849316e8316f435813bf150808085dea22296
SHA25695167244c60d7b1416d38fbb027c1146365d5cf85e2f9852c1d2822c3ae1ce85
SHA5121509224f70388cdf9bf6b3162df1a171869253febfb5a64699cdfa9a45c2f9006a455f9dc2fb68e1ebc1dc4df65f335d082a987ebce29f839f3dfe25880ff0cf
-
C:\Users\Admin\AppData\Local\1CWkmyZ\usocoreworker.exeFilesize
1.3MB
MD52c5efb321aa64af37dedc6383ce3198e
SHA1a06d7020dd43a57047a62bfb443091cd9de946ba
SHA2560fb6688a32340036f3eaab4a09a82dee533bfb2ca266c36f6142083134de6f0e
SHA5125448ea01b24af7444505bda80064849a2efcc459011d32879e021e836fd573c9b1b9d3b37291d3f53ff536c691ac13a545b12f318a16c8a367421986bbf002ed
-
C:\Users\Admin\AppData\Local\G4dxYUNg\MoUsoCoreWorker.exeFilesize
1.6MB
MD547c6b45ff22b73caf40bb29392386ce3
SHA17e29a8d98fbb9b02d3d22e3576f4fd61ab50ffe9
SHA256cbccb642725edb42e749e26ded68a16b3aa20e291a1a7793a2d4efebb75f99c0
SHA512c919ab84a497616e7969d58c251f4e6efc337b41ef6956864b86d66ae1437294c124232fec54433eab3a6518ed529f8445dd0b23706b2f42f3fa42e69711f331
-
C:\Users\Admin\AppData\Local\G4dxYUNg\XmlLite.dllFilesize
1.2MB
MD577bf8e186b3d94d0a9ade5a7b4e44f75
SHA1c4581c4208652f3ea39993bb4f8596353ccddbd3
SHA25600652d5c352c2512de3a808f7e74eebe4254a9abd716a41a4469c214cda127f3
SHA51204ef75d6bcc8ab9bb249337d5f532a567b0910dccfb67ff32ee098c10b7bc93072209307bef7eec39b9c8668a01ff8194fc966c6adc8d103a1f7115c00db4d15
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Lkikclgcaixpoht.lnkFilesize
1KB
MD5762586a9e80235635af3ca8cd001d557
SHA16cf8903abd11018db8b98d5bbfcbf4bf1e1577c2
SHA256bde72a399feaeba57365ca07fbd43b3a63a127b7619841a7395aae821be35b38
SHA5124536d2fba20fac31d46da44147d035cee7b9f78ca8afce399889032067e284902001bf72ae68ce1034fb6e79ffd7f8d6bdec4cd65aa614676e9503e0dfa16e2a
-
memory/956-86-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/956-83-0x0000023552BD0000-0x0000023552BD7000-memory.dmpFilesize
28KB
-
memory/1572-0-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1572-39-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1572-3-0x00000297CAF90000-0x00000297CAF97000-memory.dmpFilesize
28KB
-
memory/2608-52-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/2608-49-0x000001BFCFD20000-0x000001BFCFD27000-memory.dmpFilesize
28KB
-
memory/2608-46-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/3416-66-0x0000020DB16B0000-0x0000020DB16B7000-memory.dmpFilesize
28KB
-
memory/3416-69-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/3440-36-0x00007FF8E9DFA000-0x00007FF8E9DFB000-memory.dmpFilesize
4KB
-
memory/3440-4-0x0000000002E70000-0x0000000002E71000-memory.dmpFilesize
4KB
-
memory/3440-6-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-24-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-8-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-9-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-12-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-11-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-13-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-33-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-37-0x0000000000F60000-0x0000000000F67000-memory.dmpFilesize
28KB
-
memory/3440-38-0x00007FF8EA230000-0x00007FF8EA240000-memory.dmpFilesize
64KB
-
memory/3440-15-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-14-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-7-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3440-10-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB