Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
b8da680c2ec2b54a1a927e4e687cc44e_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
b8da680c2ec2b54a1a927e4e687cc44e_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b8da680c2ec2b54a1a927e4e687cc44e
-
SHA1
5ba391ec8c41655ebb76732dfe1b4bd470e34dc6
-
SHA256
4f1f5e5b9f30d646997d0de0b5fd38fb7f4b9c877643621807910391d8466431
-
SHA512
99925a5e56d137785c13126b2d75472cfaf7d271ea4f2d434c86544f555d208816bd97c9a2c58b2316b452cdf9bb29b695fbbc23af0ae2e56b98f38fbb37e22d
-
SSDEEP
24576:duYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:39cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3524-4-0x0000000002A90000-0x0000000002A91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
usocoreworker.exewusa.exewextract.exepid process 1064 usocoreworker.exe 2592 wusa.exe 4808 wextract.exe -
Loads dropped DLL 3 IoCs
Processes:
usocoreworker.exewusa.exewextract.exepid process 1064 usocoreworker.exe 2592 wusa.exe 4808 wextract.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Esxju = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\CloudStore\\a9j5kcNrVW\\wusa.exe" -
Processes:
usocoreworker.exewusa.exewextract.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA usocoreworker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2244 rundll32.exe 2244 rundll32.exe 2244 rundll32.exe 2244 rundll32.exe 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3524 Token: SeCreatePagefilePrivilege 3524 Token: SeShutdownPrivilege 3524 Token: SeCreatePagefilePrivilege 3524 Token: SeShutdownPrivilege 3524 Token: SeCreatePagefilePrivilege 3524 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3524 3524 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3524 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3524 wrote to memory of 4204 3524 usocoreworker.exe PID 3524 wrote to memory of 4204 3524 usocoreworker.exe PID 3524 wrote to memory of 1064 3524 usocoreworker.exe PID 3524 wrote to memory of 1064 3524 usocoreworker.exe PID 3524 wrote to memory of 4564 3524 wusa.exe PID 3524 wrote to memory of 4564 3524 wusa.exe PID 3524 wrote to memory of 2592 3524 wusa.exe PID 3524 wrote to memory of 2592 3524 wusa.exe PID 3524 wrote to memory of 1616 3524 wextract.exe PID 3524 wrote to memory of 1616 3524 wextract.exe PID 3524 wrote to memory of 4808 3524 wextract.exe PID 3524 wrote to memory of 4808 3524 wextract.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8da680c2ec2b54a1a927e4e687cc44e_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3416,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵
-
C:\Windows\system32\usocoreworker.exeC:\Windows\system32\usocoreworker.exe1⤵
-
C:\Users\Admin\AppData\Local\8ym\usocoreworker.exeC:\Users\Admin\AppData\Local\8ym\usocoreworker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵
-
C:\Users\Admin\AppData\Local\oRn7RS\wusa.exeC:\Users\Admin\AppData\Local\oRn7RS\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵
-
C:\Users\Admin\AppData\Local\q8VCt\wextract.exeC:\Users\Admin\AppData\Local\q8VCt\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8ym\XmlLite.dllFilesize
1.2MB
MD573042d01ccbf1fd37c6de084396bece7
SHA1fc81ba90a3b187570f9b118a024c3d3e88c4613b
SHA256a6f0452c18cfa1bf0c9506b1286684c71918f061f553341cca4110625ac31151
SHA512ee6f18122a696938b190296412b3e1e78dda8ec828b56b0e962e7c3b8a79564f8e99e81ba17e605ff3a1fc4fe5e73aa4e38ea76ce38a9f221e6e82ff79c8b7aa
-
C:\Users\Admin\AppData\Local\8ym\usocoreworker.exeFilesize
1.3MB
MD52c5efb321aa64af37dedc6383ce3198e
SHA1a06d7020dd43a57047a62bfb443091cd9de946ba
SHA2560fb6688a32340036f3eaab4a09a82dee533bfb2ca266c36f6142083134de6f0e
SHA5125448ea01b24af7444505bda80064849a2efcc459011d32879e021e836fd573c9b1b9d3b37291d3f53ff536c691ac13a545b12f318a16c8a367421986bbf002ed
-
C:\Users\Admin\AppData\Local\oRn7RS\dpx.dllFilesize
1.2MB
MD554bc8de9f1f9e8626b193f9957a4fb32
SHA131b941396a8b07f68ebecafcb11745c187649fdf
SHA256a380c9a05b306ae7a7daed9ca80074587eb948d406b58b07e016ac76e4e136a2
SHA51243c87ea2b3550a227fd991d648341778bef8c74a1257559c3f61c313849964705d81f44fd0809e3ef8183760fa16b6ca3cc83d2a388773d84e8c212d27c5b0a4
-
C:\Users\Admin\AppData\Local\oRn7RS\wusa.exeFilesize
309KB
MD5e43499ee2b4cf328a81bace9b1644c5d
SHA1b2b55641f2799e3fdb3bea709c9532017bbac59d
SHA2563e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb
SHA51204823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b
-
C:\Users\Admin\AppData\Local\q8VCt\VERSION.dllFilesize
1.2MB
MD5600bd938a065d1b80358ce49b2a1a011
SHA1c45f825fea47147abf91f8d24a2ff7809aa6f7f7
SHA256aaa1c75528b79c4528e57686ff760d18967bbac3a3adf9e88c91fbc71989b37c
SHA512f3c001dc1379efc4e2adeeb0cb53eabee4af43160c7a166baeecbf61de7b8c80325559addff51aa537af367987ce7fdeda9377577eea164631c551f338e5c847
-
C:\Users\Admin\AppData\Local\q8VCt\wextract.exeFilesize
143KB
MD556e501e3e49cfde55eb1caabe6913e45
SHA1ab2399cbf17dbee7b302bea49e40d4cee7caea76
SHA256fbb6dc62abeeb222b49a63f43dc6eea96f3d7e9a8da55381c15d57a5d099f3e0
SHA5122b536e86cbd8ab026529ba2c72c0fda97e9b6f0bc4fd96777024155852670cb41d17937cde372a44cdbad3e53b8cd3ef1a4a3ee9b34dfb3c2069822095f7a172
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Xpqmtuztdhk.lnkFilesize
1KB
MD59338b5a17f469dc431096c42c094e50e
SHA178ceaafd8289958990023e6213d3ae74bd88dfb4
SHA256f0f131f3f50331136f0d1bfd081d20d7b765970fba6487da937681a512faedb6
SHA51216fd0b17ab123766a25a8e6dd4779733e0f50663b30dfce5a6dc88fe42768cbfad16143c0bd19ac97a2d9f91941162cb97df92abe58c3d7dd69f6b637c71a1b5
-
memory/1064-47-0x00007FF843390000-0x00007FF8434D2000-memory.dmpFilesize
1.3MB
-
memory/1064-53-0x00007FF843390000-0x00007FF8434D2000-memory.dmpFilesize
1.3MB
-
memory/1064-50-0x000001C759310000-0x000001C759317000-memory.dmpFilesize
28KB
-
memory/2244-0-0x00007FF853570000-0x00007FF8536B1000-memory.dmpFilesize
1.3MB
-
memory/2244-40-0x00007FF853570000-0x00007FF8536B1000-memory.dmpFilesize
1.3MB
-
memory/2244-3-0x0000024C7F470000-0x0000024C7F477000-memory.dmpFilesize
28KB
-
memory/2592-72-0x00007FF843390000-0x00007FF8434D2000-memory.dmpFilesize
1.3MB
-
memory/2592-69-0x0000022117C10000-0x0000022117C17000-memory.dmpFilesize
28KB
-
memory/3524-37-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-17-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-26-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-8-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-7-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-11-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-13-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-14-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-16-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-10-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-35-0x0000000002A70000-0x0000000002A77000-memory.dmpFilesize
28KB
-
memory/3524-36-0x00007FF860F90000-0x00007FF860FA0000-memory.dmpFilesize
64KB
-
memory/3524-18-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-15-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-9-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-12-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3524-4-0x0000000002A90000-0x0000000002A91000-memory.dmpFilesize
4KB
-
memory/3524-6-0x00007FF860BAA000-0x00007FF860BAB000-memory.dmpFilesize
4KB
-
memory/4808-89-0x00007FF843390000-0x00007FF8434D2000-memory.dmpFilesize
1.3MB
-
memory/4808-85-0x0000028F735F0000-0x0000028F735F7000-memory.dmpFilesize
28KB