Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
73675d3e6348ef7b1be6cc67b90f6333_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
73675d3e6348ef7b1be6cc67b90f6333_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
73675d3e6348ef7b1be6cc67b90f6333
-
SHA1
1acb6cc9cb689cf8c28eb1df47c9d82ff194aacc
-
SHA256
f9596306e520a651e3f91e376df0211f2cf382a5b0e69b4900357abb3c6b7a7e
-
SHA512
bba7f9e8b727bcdb716f2c9d19fd03700d1c8d4f5055c3329a2e31f6c4068d7ea0cf31c1cb659b66c22875ff383ef1087f95a96977e51ee14e80d10f082eb688
-
SSDEEP
24576:FVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:FV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3516-4-0x00000000077A0000-0x00000000077A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
Processes:
usocoreworker.exesdclt.exeie4uinit.exeMDMAppInstaller.exepid process 4060 usocoreworker.exe 4608 sdclt.exe 4340 ie4uinit.exe 1092 MDMAppInstaller.exe -
Loads dropped DLL 6 IoCs
Processes:
usocoreworker.exesdclt.exeie4uinit.exeMDMAppInstaller.exepid process 4060 usocoreworker.exe 4608 sdclt.exe 4340 ie4uinit.exe 4340 ie4uinit.exe 4340 ie4uinit.exe 1092 MDMAppInstaller.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ihmks = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\WINDOW~1\\76p\\sdclt.exe" -
Processes:
usocoreworker.exesdclt.exeMDMAppInstaller.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA usocoreworker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MDMAppInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2952 rundll32.exe 2952 rundll32.exe 2952 rundll32.exe 2952 rundll32.exe 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 3516 -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 Token: SeShutdownPrivilege 3516 Token: SeCreatePagefilePrivilege 3516 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3516 3516 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3516 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid process target process PID 3516 wrote to memory of 3608 3516 usocoreworker.exe PID 3516 wrote to memory of 3608 3516 usocoreworker.exe PID 3516 wrote to memory of 4060 3516 usocoreworker.exe PID 3516 wrote to memory of 4060 3516 usocoreworker.exe PID 3516 wrote to memory of 4080 3516 sdclt.exe PID 3516 wrote to memory of 4080 3516 sdclt.exe PID 3516 wrote to memory of 4608 3516 sdclt.exe PID 3516 wrote to memory of 4608 3516 sdclt.exe PID 3516 wrote to memory of 4588 3516 ie4uinit.exe PID 3516 wrote to memory of 4588 3516 ie4uinit.exe PID 3516 wrote to memory of 4340 3516 ie4uinit.exe PID 3516 wrote to memory of 4340 3516 ie4uinit.exe PID 3516 wrote to memory of 1468 3516 MDMAppInstaller.exe PID 3516 wrote to memory of 1468 3516 MDMAppInstaller.exe PID 3516 wrote to memory of 1092 3516 MDMAppInstaller.exe PID 3516 wrote to memory of 1092 3516 MDMAppInstaller.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73675d3e6348ef7b1be6cc67b90f6333_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\usocoreworker.exeC:\Windows\system32\usocoreworker.exe1⤵
-
C:\Users\Admin\AppData\Local\zF1vSK5R\usocoreworker.exeC:\Users\Admin\AppData\Local\zF1vSK5R\usocoreworker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵
-
C:\Users\Admin\AppData\Local\YtcD2BRaU\sdclt.exeC:\Users\Admin\AppData\Local\YtcD2BRaU\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵
-
C:\Users\Admin\AppData\Local\Hhix4NU\ie4uinit.exeC:\Users\Admin\AppData\Local\Hhix4NU\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\MDMAppInstaller.exeC:\Windows\system32\MDMAppInstaller.exe1⤵
-
C:\Users\Admin\AppData\Local\xKm1boy\MDMAppInstaller.exeC:\Users\Admin\AppData\Local\xKm1boy\MDMAppInstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Hhix4NU\VERSION.dllFilesize
1.2MB
MD53dba25d7800303dff3fd0a9a86a50164
SHA1eb6eba52b530fc64e6d5c8eabf533d43287ab19d
SHA25648f277da8b45b86af6366ae7e863be01cea1c854af29e3a3b13e981726152e9c
SHA512c078d48a79dcce25ccff05683044b5bf612e34bf197664700bccbafd2fab5d5b91f38f5603f7ba9afbe340bd06defc9317e716031f06d0a4621eb83b80849167
-
C:\Users\Admin\AppData\Local\Hhix4NU\ie4uinit.exeFilesize
262KB
MD5a2f0104edd80ca2c24c24356d5eacc4f
SHA18269b9fd9231f04ed47419bd565c69dc677fab56
SHA2565d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c
SHA512e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390
-
C:\Users\Admin\AppData\Local\YtcD2BRaU\ReAgent.dllFilesize
1.2MB
MD5c00eb4ef3067ebe90801b8926f435105
SHA176a09c764e937e137c14bef85b6baa40f20141b4
SHA25696e813b8bc3179b887cc5da004f41be11fab9a50b927c84e9db68c657b6abfae
SHA5123c9cee7194fe1094d9eb7cfe566533faf9c61c79cf2fbbd0653352eaa24285bc80786b103ae37e55368b8b7ac086cf0d74c5abcf271a9992f1e4bf0830326f9e
-
C:\Users\Admin\AppData\Local\YtcD2BRaU\sdclt.exeFilesize
1.2MB
MD5e09d48f225e7abcab14ebd3b8a9668ec
SHA11c5b9322b51c09a407d182df481609f7cb8c425d
SHA256efd238ea79b93d07852d39052f1411618c36e7597e8af0966c4a3223f0021dc3
SHA512384d606b90c4803e5144b4de24edc537cb22dd59336a18a58d229500ed36aec92c8467cae6d3f326647bd044d8074931da553c7809727fb70227e99c257df0b4
-
C:\Users\Admin\AppData\Local\xKm1boy\MDMAppInstaller.exeFilesize
151KB
MD530e978cc6830b04f1e7ed285cccaa746
SHA1e915147c17e113c676c635e2102bbff90fb7aa52
SHA256dc821931f63117962e2266acd3266e86bf8116d4a14b3adbebfade1d40b84766
SHA512331923fa479f71c4c80b0e86ea238628666f95b6cf61cf4d741ae4a27ea2b8c636864dfac543d14599b4873f3b2ab397d07c4e4c17aca3f3b4e5871e24e50214
-
C:\Users\Admin\AppData\Local\xKm1boy\WTSAPI32.dllFilesize
1.2MB
MD594aced4c6ab4298f8e42af70834452ad
SHA156ccb0c6312c2e5694b3a75c254a6c16522f8a6a
SHA256f07ed7090589c5f9d51152b386ff1453006260f8d9145d324e771d65031c89d7
SHA512c3323e075daae5ff1438ab69b9a9e3c8baee18887936fa1abf1c2abf4f51105bc75f54c234232407e3214351953002716ae50d4acd227e7cfbab5ca73948edd6
-
C:\Users\Admin\AppData\Local\zF1vSK5R\XmlLite.dllFilesize
1.2MB
MD5e248e58a0f8414c144598cf183bfefd2
SHA13bc8247c4856d779d1a1c7519c4441ac788ef05b
SHA256938167f889a1bb2a23c60278315d8c9db3104cc7a6aca0a98bebba31a038defe
SHA5125828f46884e76d9c2849010fba090b7f0f23be929ba3b27d17b1053ffd4b8b1421a15107dc1dd5678a494e9de8c3da29652605bd67cae823713187d60d35868b
-
C:\Users\Admin\AppData\Local\zF1vSK5R\usocoreworker.exeFilesize
1.3MB
MD52c5efb321aa64af37dedc6383ce3198e
SHA1a06d7020dd43a57047a62bfb443091cd9de946ba
SHA2560fb6688a32340036f3eaab4a09a82dee533bfb2ca266c36f6142083134de6f0e
SHA5125448ea01b24af7444505bda80064849a2efcc459011d32879e021e836fd573c9b1b9d3b37291d3f53ff536c691ac13a545b12f318a16c8a367421986bbf002ed
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Yvephsk.lnkFilesize
1KB
MD5a770f6fbe64f07e718ebe3bfc6631ebf
SHA15672e940296ebf54818c9313953ebf1ef77fe348
SHA256a9d447697a146e34a6cf5ad28e442ec62383958b28c8144e532332f84d458cb0
SHA512372931098742cf34480539f02fcebf1260bf853d92629154d5169d715db313bdcf4515d7df6fc1cbb87fb956f7e8b1169150ccc09ca5e55e1f4a80b4f4061660
-
memory/1092-97-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2952-1-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2952-39-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2952-3-0x0000018DA4580000-0x0000018DA4587000-memory.dmpFilesize
28KB
-
memory/3516-34-0x0000000007780000-0x0000000007787000-memory.dmpFilesize
28KB
-
memory/3516-13-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-25-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-9-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-7-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-10-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-11-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-12-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-6-0x00007FFE8AC3A000-0x00007FFE8AC3B000-memory.dmpFilesize
4KB
-
memory/3516-4-0x00000000077A0000-0x00000000077A1000-memory.dmpFilesize
4KB
-
memory/3516-14-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-8-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-35-0x00007FFE8CB70000-0x00007FFE8CB80000-memory.dmpFilesize
64KB
-
memory/3516-15-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-16-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/3516-36-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/4060-52-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/4060-46-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/4060-49-0x000001FEAFD60000-0x000001FEAFD67000-memory.dmpFilesize
28KB
-
memory/4340-82-0x00000180EA840000-0x00000180EA984000-memory.dmpFilesize
1.3MB
-
memory/4340-83-0x00000180EA6F0000-0x00000180EA834000-memory.dmpFilesize
1.3MB
-
memory/4608-69-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/4608-66-0x0000027A29A40000-0x0000027A29A47000-memory.dmpFilesize
28KB