Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 22:59

General

  • Target

    ec2c71472a0103be14ec56663fccb1e3_JaffaCakes118.dll

  • Size

    3.2MB

  • MD5

    ec2c71472a0103be14ec56663fccb1e3

  • SHA1

    5331fc9b33a6a89d066c41f1e75f088cc007eb0f

  • SHA256

    8ce0ecc60cb931709f7a4356887eee27d3147375e86902e648072669fba2e9b5

  • SHA512

    f36966fbb8902fb6a48ea8e486d11240b9d6fe05c128fc076c1040ee938646d8e747cbe775af4d2ac31dd2921b7d66751ad2f9c3d112829c1a41f2b970762e46

  • SSDEEP

    12288:5VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:4fP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ec2c71472a0103be14ec56663fccb1e3_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:4632
  • C:\Windows\system32\systemreset.exe
    C:\Windows\system32\systemreset.exe
    1⤵
      PID:2796
    • C:\Users\Admin\AppData\Local\PI2006ki\systemreset.exe
      C:\Users\Admin\AppData\Local\PI2006ki\systemreset.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1960
    • C:\Windows\system32\phoneactivate.exe
      C:\Windows\system32\phoneactivate.exe
      1⤵
        PID:3516
      • C:\Users\Admin\AppData\Local\yWEgtjGS\phoneactivate.exe
        C:\Users\Admin\AppData\Local\yWEgtjGS\phoneactivate.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4488
      • C:\Windows\system32\ProximityUxHost.exe
        C:\Windows\system32\ProximityUxHost.exe
        1⤵
          PID:4164
        • C:\Users\Admin\AppData\Local\MqAA\ProximityUxHost.exe
          C:\Users\Admin\AppData\Local\MqAA\ProximityUxHost.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:5080
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3720 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:3200

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\MqAA\ProximityUxHost.exe

            Filesize

            263KB

            MD5

            9ea326415b83d77295c70a35feb75577

            SHA1

            f8fc6a4f7f97b242f35066f61d305e278155b8a8

            SHA256

            192bfde77bf280e48f92d1eceacdc7ec4bf31cda46f7d577c7d7c3ec3ac89d8f

            SHA512

            2b1943600f97abcd18778101e33eac00c2bd360a3eff62fef65f668a084d8fa38c3bbdedfc6c2b7e8410aa7c9c3df2734705dc502b4754259121adc9198c3692

          • C:\Users\Admin\AppData\Local\MqAA\WINMM.dll

            Filesize

            3.2MB

            MD5

            f3c9b9a414b78ff7481e177a42af3bba

            SHA1

            ce872d581639aa37938d1bb0bb11cc2c9be53832

            SHA256

            85ff99eff4effb0db0ecd18fd0a7d916b51d5fcca5c0a8d1eb14a0075dff97f1

            SHA512

            63162fbe7f0d8b3e4320f7a210da31422ca0bb733b1df7f854bf52cd08d24bbfbca88a0ef74570eb6d0defe2858ffa68409628d22f808c9b52a8ffd48a49227f

          • C:\Users\Admin\AppData\Local\PI2006ki\DUI70.dll

            Filesize

            3.5MB

            MD5

            ad32cd81b06e473f123a253c49223ee3

            SHA1

            17541381ac624207484f409a963acd60f3481f89

            SHA256

            65d177a3921a00361f0386ad3e8a3d5886776e8db723d9539fb5899ad9d60e94

            SHA512

            bf4709d592b98c7fc404d0982b0bbb6cc2f24ec27232b88d0c2f2a3b8207780b4d155a37ea9aa4d8a1898da2ab94ce4592e72c1e6b4c1c3c6b5068733c383c2d

          • C:\Users\Admin\AppData\Local\PI2006ki\systemreset.exe

            Filesize

            508KB

            MD5

            325ff647506adb89514defdd1c372194

            SHA1

            84234ff97d6ddc8a4ea21303ea842aa76a74e0ea

            SHA256

            ebff6159a7627234f94f606afa2e55e98e1548fd197d22779a5fcff24aa477ad

            SHA512

            8a9758f4af0264be08d684125827ef11efe651138059f6b463c52476f8a8e1bed94d093042f85893cb3e37c5f3ba7b55c6ce9394595001e661bccbc578da3868

          • C:\Users\Admin\AppData\Local\yWEgtjGS\DUI70.dll

            Filesize

            3.5MB

            MD5

            404558a5477c78400ab54b4a74541b97

            SHA1

            258f663d8aaca5a8ae8bedb4dc2fb78735004658

            SHA256

            c22fcafb24194aa2b6106a18fe4b2082124aab125755603243d2c2f417de2c9f

            SHA512

            4835ae72661ed127bde0ed3e3a20727e0260bb443d16f38d074e5b35ee2405e527886d8952976ee62f55056ac53654c2a7fa9bb134f9c8ed6f389e2a6e55d55a

          • C:\Users\Admin\AppData\Local\yWEgtjGS\phoneactivate.exe

            Filesize

            107KB

            MD5

            32c31f06e0b68f349f68afdd08e45f3d

            SHA1

            e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c

            SHA256

            cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017

            SHA512

            fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26

          • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Wsryduxuroil.lnk

            Filesize

            1KB

            MD5

            146d21a95b245b3ddae25820ed4c2492

            SHA1

            7a2dda5f95ab7f5d20fafec5e06496575fb1a953

            SHA256

            d38f837e7dcd53f4d026c22b497a68f61c4db984d7baa977d671be7d21e29c09

            SHA512

            94b410ec428de1472ae5d14e7cfb94403abd0149f14ebeb2b69ca2725527d193097593dc83647407e7874b408715008179fb9e5e87cbdd087aed692239ee13f9

          • memory/1960-100-0x000001E825020000-0x000001E825027000-memory.dmp

            Filesize

            28KB

          • memory/3556-42-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-48-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-16-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-17-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-18-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-19-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-20-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-21-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-22-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-23-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-24-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-25-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-26-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-27-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-28-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-29-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-30-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-47-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-32-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-33-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-34-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-35-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-36-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-37-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-38-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-39-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-40-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-41-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-4-0x0000000002E80000-0x0000000002E81000-memory.dmp

            Filesize

            4KB

          • memory/3556-43-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-44-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-45-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-15-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-46-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-31-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-49-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-50-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-52-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-51-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-53-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-55-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-56-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-57-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-58-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-59-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-60-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-61-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-54-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-62-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-63-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-64-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-65-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-71-0x00000000010C0000-0x00000000010C7000-memory.dmp

            Filesize

            28KB

          • memory/3556-79-0x00007FF9331E0000-0x00007FF9331F0000-memory.dmp

            Filesize

            64KB

          • memory/3556-14-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-13-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-12-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-11-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-10-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-6-0x00007FF932CCA000-0x00007FF932CCB000-memory.dmp

            Filesize

            4KB

          • memory/3556-9-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/3556-7-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/4488-117-0x00000221E2440000-0x00000221E2447000-memory.dmp

            Filesize

            28KB

          • memory/4632-0-0x0000021532B00000-0x0000021532B07000-memory.dmp

            Filesize

            28KB

          • memory/4632-1-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/4632-8-0x0000000140000000-0x0000000140337000-memory.dmp

            Filesize

            3.2MB

          • memory/5080-133-0x000001A3ABDF0000-0x000001A3ABDF7000-memory.dmp

            Filesize

            28KB