Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
6546ef01ad7cf5ea8767ca35e0a9497d_JaffaCakes118.dll
Resource
win7-20240220-en
General
-
Target
6546ef01ad7cf5ea8767ca35e0a9497d_JaffaCakes118.dll
-
Size
989KB
-
MD5
6546ef01ad7cf5ea8767ca35e0a9497d
-
SHA1
8302c377caccf0332af3c94ef45217a929b61110
-
SHA256
c9d45c41ecba0e13d08bea6b3393cf730d02482f0923b754a2ab72b9ea9ee361
-
SHA512
135fc8029dfdcd91fd5ec72b65a8fdd2a240f0627116530cc6fc878045dbce0c92f96d78f2b6faa645a98ae0f3024261199369b59a7b2bd6cb72210172362b24
-
SSDEEP
24576:xVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:xV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3440-4-0x0000000002720000-0x0000000002721000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DevicePairingWizard.exeusocoreworker.exeDevicePairingWizard.exepid process 1532 DevicePairingWizard.exe 1140 usocoreworker.exe 4396 DevicePairingWizard.exe -
Loads dropped DLL 3 IoCs
Processes:
DevicePairingWizard.exeusocoreworker.exeDevicePairingWizard.exepid process 1532 DevicePairingWizard.exe 1140 usocoreworker.exe 4396 DevicePairingWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pruztwesow = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\zP\\usocoreworker.exe" -
Processes:
rundll32.exeDevicePairingWizard.exeusocoreworker.exeDevicePairingWizard.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA usocoreworker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3440 wrote to memory of 2780 3440 DevicePairingWizard.exe PID 3440 wrote to memory of 2780 3440 DevicePairingWizard.exe PID 3440 wrote to memory of 1532 3440 DevicePairingWizard.exe PID 3440 wrote to memory of 1532 3440 DevicePairingWizard.exe PID 3440 wrote to memory of 2736 3440 usocoreworker.exe PID 3440 wrote to memory of 2736 3440 usocoreworker.exe PID 3440 wrote to memory of 1140 3440 usocoreworker.exe PID 3440 wrote to memory of 1140 3440 usocoreworker.exe PID 3440 wrote to memory of 3844 3440 DevicePairingWizard.exe PID 3440 wrote to memory of 3844 3440 DevicePairingWizard.exe PID 3440 wrote to memory of 4396 3440 DevicePairingWizard.exe PID 3440 wrote to memory of 4396 3440 DevicePairingWizard.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6546ef01ad7cf5ea8767ca35e0a9497d_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\KdJ\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\KdJ\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\usocoreworker.exeC:\Windows\system32\usocoreworker.exe1⤵
-
C:\Users\Admin\AppData\Local\x9a71Jl\usocoreworker.exeC:\Users\Admin\AppData\Local\x9a71Jl\usocoreworker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\Kkr\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\Kkr\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\KdJ\DevicePairingWizard.exeFilesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
C:\Users\Admin\AppData\Local\KdJ\MFC42u.dllFilesize
1017KB
MD5f8a837f8231f97647297cc829cf76d95
SHA1dfda36f911424ea3c949f12a523a3d839c03c842
SHA256eb89b0c2b6f7cfd8fedbf3195ffcc005983b3416bac494bd4682bec1e948d265
SHA5127e251a1f74172dd24b586486484a5c4e0e794d1c569a75f615c00714240df4149c23d248d9ea6729ad010dbed8d719dabc1cfe77cd998ea7edadf641ba6b8c10
-
C:\Users\Admin\AppData\Local\Kkr\MFC42u.dllFilesize
1017KB
MD5780d8805de8478d785e962d8e4931138
SHA14c61b874065a1cc30038faf85b01fcc2e993ae80
SHA256bb96dba2669a6e66c900496b656b3561ecc8e4f68862ee4559df144093d10298
SHA5126d512792b0d8fd316df3b7a7a523131ad5845422712e49a92ad0ae4fcf0f6d2615bd5c4814547324d1fb5d7d4b095848d755326fe7466ffeccfa91d94afd875b
-
C:\Users\Admin\AppData\Local\x9a71Jl\XmlLite.dllFilesize
990KB
MD5b2e10e5549d54a22223791935f73274a
SHA132221e7e4c7e330d4d525c863c26f8e049cb9abe
SHA256598e1b33ebcb12931f73043b2223847bfc81f49c48d5105f58a2eba34bc70942
SHA51222df0929376968da24a1507a5381c3a5310fa880c6b4917e46167d4e3e4dbc4ae3a2c359fc116f0ef3850befe2b35bbde6c8fcbf95cb5381c0fbdf24043a2c06
-
C:\Users\Admin\AppData\Local\x9a71Jl\usocoreworker.exeFilesize
1.3MB
MD52c5efb321aa64af37dedc6383ce3198e
SHA1a06d7020dd43a57047a62bfb443091cd9de946ba
SHA2560fb6688a32340036f3eaab4a09a82dee533bfb2ca266c36f6142083134de6f0e
SHA5125448ea01b24af7444505bda80064849a2efcc459011d32879e021e836fd573c9b1b9d3b37291d3f53ff536c691ac13a545b12f318a16c8a367421986bbf002ed
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Arcabpqqvo.lnkFilesize
1KB
MD5f31bc833c57e9ec79111b9b2d26c6eb5
SHA1efde5dc829dda4df9d61be4b479cdee060ee2298
SHA256283557db95a7a7755fb50eb24c068d3146da2c5a600d55328f59b2c01dbe3440
SHA512f03147ee4252415a8c2b3c01b74db50f223cbbf5c740a73ef47daf665331c3bcac09f13416bf14d1d3b8f9deef1a49fde286b89a9830f9f52436528b6e49842b
-
memory/1140-64-0x0000028A82980000-0x0000028A82987000-memory.dmpFilesize
28KB
-
memory/1140-61-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1140-67-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1532-50-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/1532-47-0x0000014A85930000-0x0000014A85937000-memory.dmpFilesize
28KB
-
memory/1532-44-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/1928-0-0x000001AF3BE20000-0x000001AF3BE27000-memory.dmpFilesize
28KB
-
memory/1928-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1928-2-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-34-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-31-0x00007FFA62A7A000-0x00007FFA62A7B000-memory.dmpFilesize
4KB
-
memory/3440-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-6-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-32-0x00000000008C0000-0x00000000008C7000-memory.dmpFilesize
28KB
-
memory/3440-33-0x00007FFA63A10000-0x00007FFA63A20000-memory.dmpFilesize
64KB
-
memory/3440-22-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/3440-4-0x0000000002720000-0x0000000002721000-memory.dmpFilesize
4KB
-
memory/4396-84-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/4396-81-0x0000022D3EF40000-0x0000022D3EF47000-memory.dmpFilesize
28KB