Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 11:49

General

  • Target

    f7edf14bfa55dd4235c32177c4cba776_JaffaCakes118.dll

  • Size

    868KB

  • MD5

    f7edf14bfa55dd4235c32177c4cba776

  • SHA1

    ba1bbfca1c2e05f1ae2c3390e97acbde99e28f2a

  • SHA256

    2044e2521531c1a0b7f8f2d22ac397bd632c2985e2c1e1d479bb2dcc35f9b094

  • SHA512

    9bb89ce389c05868b8b067fa2bff1303a474a79a15b33d77ac0ffb155ae10ba3cc9fabf0c6dcca8d830fde9760e030b9631587226876fe42a7bafa61646dc435

  • SSDEEP

    12288:LkbQEkWqv+157EYfxarhwLNuR7ek1tHffB/HzTyNQ6NIeGYr/R:LkbHkWfzZ5adwLNGeStHntqN7v

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f7edf14bfa55dd4235c32177c4cba776_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2380
  • C:\Windows\system32\fveprompt.exe
    C:\Windows\system32\fveprompt.exe
    1⤵
      PID:2488
    • C:\Users\Admin\AppData\Local\AotkZzv\fveprompt.exe
      C:\Users\Admin\AppData\Local\AotkZzv\fveprompt.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2616
    • C:\Windows\system32\fvenotify.exe
      C:\Windows\system32\fvenotify.exe
      1⤵
        PID:2948
      • C:\Users\Admin\AppData\Local\2cGqi\fvenotify.exe
        C:\Users\Admin\AppData\Local\2cGqi\fvenotify.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2400
      • C:\Windows\system32\SystemPropertiesComputerName.exe
        C:\Windows\system32\SystemPropertiesComputerName.exe
        1⤵
          PID:1608
        • C:\Users\Admin\AppData\Local\UMTMAoRl8\SystemPropertiesComputerName.exe
          C:\Users\Admin\AppData\Local\UMTMAoRl8\SystemPropertiesComputerName.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2412

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Query Registry

        1
        T1012

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\2cGqi\slc.dll
          Filesize

          872KB

          MD5

          fa85356b2ffe7e62d32de18fa9447207

          SHA1

          3224f74d70f5f4167ee20ca08d4eed2a3484f1df

          SHA256

          00e4e4eb34f07b308bffcb3ec4962280a838a73c9586ce33856766fce4382bbb

          SHA512

          971bf963af1909599ffa1a0b922b31087576635998215539ba76395e381782da3bc7ada8643bc66f7198c1c1e470a0cb4547acb8b5a6ce969f2ee7769be09169

        • C:\Users\Admin\AppData\Local\AotkZzv\fveprompt.exe
          Filesize

          104KB

          MD5

          dc2c44a23b2cd52bd53accf389ae14b2

          SHA1

          e36c7b6f328aa2ab2f52478169c52c1916f04b5f

          SHA256

          7f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921

          SHA512

          ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc

        • C:\Users\Admin\AppData\Local\UMTMAoRl8\SYSDM.CPL
          Filesize

          872KB

          MD5

          ce3323d436785820248d93832b9c03e2

          SHA1

          5017c204d6f4f0749b486e9f760e1bf5077c4b53

          SHA256

          314b298795585159194395472767625013ea12b835bf5bccd7f0a3cf257f7366

          SHA512

          8eb4fd9ca9b7a1300aca9e64c14d0e6850077dcbe94127c7774d239505b84a2dfcfbdd0a178e20cc993001260fdac57f6111461c851a88ef70486a13f0318302

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Aqrvnhd.lnk
          Filesize

          1KB

          MD5

          8fbb1cf6865beec61c19fb810a489ec1

          SHA1

          48465a253f73cd9451f842f54fb14db8545f7828

          SHA256

          59ab3101d0cca300b9dfd87fee71e996d56c33ab22c369d2d4563e76f93c406d

          SHA512

          2ddb1563c8dd7bf1f3be9e06ab871abc8cf7b17ebea089bc8c548a82fe6e0743184de4e0e8885dd1bf521ef40035a6610f4cf6c134e17a851ad40ede4935312c

        • \Users\Admin\AppData\Local\2cGqi\fvenotify.exe
          Filesize

          117KB

          MD5

          e61d644998e07c02f0999388808ac109

          SHA1

          183130ad81ff4c7997582a484e759bf7769592d6

          SHA256

          15a85cd6fbcb1ec57d78f986d6dd8908bd56231ce0cf65775075512303f7e5fa

          SHA512

          310141b73394ae12a35f8d4f0c097868ee8a8045a62dd402a5dfbe2151980dd4fe18409ae3ca9422e3b88b2fa9afb04c1acbf8ec23a937a0a242b32a9a1e9272

        • \Users\Admin\AppData\Local\AotkZzv\slc.dll
          Filesize

          872KB

          MD5

          cf11704d882c45f94aff658c307e5b3e

          SHA1

          bb4d3c5939dd391d3842312920b754b89b4833fb

          SHA256

          92785c7032710ec8e27f8554e56a44a9e3b5dbae3595a5aecf9657e75c4e89b4

          SHA512

          839214948bde3c41fce4c465dad89ba7ef33ab157dfa3e632eec96c43038a1f50d904c0f4f02cf14f22271775b0552f5de066386bf2e7bf8831c9260067bdae0

        • \Users\Admin\AppData\Local\UMTMAoRl8\SystemPropertiesComputerName.exe
          Filesize

          80KB

          MD5

          bd889683916aa93e84e1a75802918acf

          SHA1

          5ee66571359178613a4256a7470c2c3e6dd93cfa

          SHA256

          0e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf

          SHA512

          9d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026

        • memory/1372-9-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-42-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-22-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-20-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-18-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-17-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-31-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-33-0x0000000077890000-0x0000000077892000-memory.dmp
          Filesize

          8KB

        • memory/1372-32-0x0000000077860000-0x0000000077862000-memory.dmp
          Filesize

          8KB

        • memory/1372-16-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-15-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-14-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-13-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-12-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-11-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-3-0x00000000775F6000-0x00000000775F7000-memory.dmp
          Filesize

          4KB

        • memory/1372-8-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-7-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-6-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-23-0x0000000002960000-0x0000000002967000-memory.dmp
          Filesize

          28KB

        • memory/1372-43-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-4-0x0000000002980000-0x0000000002981000-memory.dmp
          Filesize

          4KB

        • memory/1372-24-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-21-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-86-0x00000000775F6000-0x00000000775F7000-memory.dmp
          Filesize

          4KB

        • memory/1372-10-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1372-19-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/2380-51-0x000007FEF6DE0000-0x000007FEF6EB9000-memory.dmp
          Filesize

          868KB

        • memory/2380-0-0x000007FEF6DE0000-0x000007FEF6EB9000-memory.dmp
          Filesize

          868KB

        • memory/2380-1-0x0000000000320000-0x0000000000327000-memory.dmp
          Filesize

          28KB

        • memory/2400-78-0x0000000000100000-0x0000000000107000-memory.dmp
          Filesize

          28KB

        • memory/2400-81-0x000007FEF7B30000-0x000007FEF7C0A000-memory.dmp
          Filesize

          872KB

        • memory/2412-94-0x0000000000180000-0x0000000000187000-memory.dmp
          Filesize

          28KB

        • memory/2412-99-0x000007FEF7B30000-0x000007FEF7C0A000-memory.dmp
          Filesize

          872KB

        • memory/2616-64-0x000007FEF7B30000-0x000007FEF7C0A000-memory.dmp
          Filesize

          872KB

        • memory/2616-61-0x0000000000290000-0x0000000000297000-memory.dmp
          Filesize

          28KB

        • memory/2616-59-0x000007FEF7B30000-0x000007FEF7C0A000-memory.dmp
          Filesize

          872KB