Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 07:03

General

  • Target

    fc32137f3e228e9e455fa2c02e9c4fc1_JaffaCakes118.dll

  • Size

    992KB

  • MD5

    fc32137f3e228e9e455fa2c02e9c4fc1

  • SHA1

    a806b54ea307a973eb90be2bfdf3548c289ea7a8

  • SHA256

    1eba96e3896ac29a02e3ff731c18d2169387d537e61f4fb9878b3d4e9955dbb4

  • SHA512

    a6d3f2dccaf18e723651b654c2053c3a3ddea3da3b22d43569c86581b3f020502fa3a37874764e2ef85468e6d13890aa33f41f98cfaf89802cd132875abcd44a

  • SSDEEP

    12288:ldMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0TF0B1fhqq:rMIJxSDX3bqjhcfHk7MzH6zuzfhq

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fc32137f3e228e9e455fa2c02e9c4fc1_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:3008
  • C:\Windows\system32\fveprompt.exe
    C:\Windows\system32\fveprompt.exe
    1⤵
      PID:2444
    • C:\Users\Admin\AppData\Local\45K44T\fveprompt.exe
      C:\Users\Admin\AppData\Local\45K44T\fveprompt.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2488
    • C:\Windows\system32\DWWIN.EXE
      C:\Windows\system32\DWWIN.EXE
      1⤵
        PID:596
      • C:\Users\Admin\AppData\Local\OjwH7\DWWIN.EXE
        C:\Users\Admin\AppData\Local\OjwH7\DWWIN.EXE
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1084
      • C:\Windows\system32\sethc.exe
        C:\Windows\system32\sethc.exe
        1⤵
          PID:1680
        • C:\Users\Admin\AppData\Local\n38\sethc.exe
          C:\Users\Admin\AppData\Local\n38\sethc.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\45K44T\slc.dll

          Filesize

          996KB

          MD5

          09076283661a37e80d27893bf502f709

          SHA1

          1f7a239e2140acbeddab527b4ca0ab8cb6a75b92

          SHA256

          2c816999011b11615088c21f8b8513d7ffc39913438e70b6e9d5ee31c7b015a7

          SHA512

          9fced731e568a4a7d49766f0658b8c387297d567fe7a6e916aed64c4a5777190a0b8540f281c29392ba55a6c743b1ed5754c47e364283b4d65d6688852d38a19

        • C:\Users\Admin\AppData\Local\OjwH7\VERSION.dll

          Filesize

          996KB

          MD5

          cf74b83dbf9c1de14c7fcec2275b1982

          SHA1

          a0dabba4e2544c95d22b21b2bffb463a6e78a126

          SHA256

          428353189bf1e7fb9c811f06a18b6f744837c3d56cd1c8fcd980b15df7dc8224

          SHA512

          fc62e611354a98b7cdc532c732c1160fb537436f9f3d04bf5df2f05c51f01b9ae621706ff86d0d5824fb0a040c73635a9fd39e4af010f771927f7d404880a94a

        • C:\Users\Admin\AppData\Local\n38\UxTheme.dll

          Filesize

          996KB

          MD5

          8d7132fe00f3ee16895b9d519c9343c5

          SHA1

          0e8e9804d3db2df04f08f00b25279e41cacc81b0

          SHA256

          05d135306120aa033a8bdc8c2b7b2589c77588d3f6ec0959c3cb4e5e9c6154ea

          SHA512

          4fc8f053335e09bbf3d2f4c9ddfb9f3e98a6389bc0aa6a6e07ef7676688906e010f870adc221537233d1e40c1f88b4814c89d56490df2fef27fb1110c7d5f1d7

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnk

          Filesize

          1KB

          MD5

          e1369826db9d2840a006032897b14176

          SHA1

          39c3d90024c11d7c4cf2a2bcdea8a0c4b21b996e

          SHA256

          6d75393add394b475642be99e2fadbc8b84abfab2826f28541c35164ea0e1210

          SHA512

          910fd568d82e8b4bd150c17bc18efdbc2ff3b96544f018d402c6263fd5c18a4889846e651d592ca7f9b7e9226b8b6f0dea87dfede7237b728d5f5906761843c6

        • \Users\Admin\AppData\Local\45K44T\fveprompt.exe

          Filesize

          104KB

          MD5

          dc2c44a23b2cd52bd53accf389ae14b2

          SHA1

          e36c7b6f328aa2ab2f52478169c52c1916f04b5f

          SHA256

          7f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921

          SHA512

          ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc

        • \Users\Admin\AppData\Local\OjwH7\DWWIN.EXE

          Filesize

          149KB

          MD5

          25247e3c4e7a7a73baeea6c0008952b1

          SHA1

          8087adb7a71a696139ddc5c5abc1a84f817ab688

          SHA256

          c740497a7e58f7678e25b68b03573b4136a364464ee97c02ce5e0fe00cec7050

          SHA512

          bc27946894e7775f772ac882740430c8b9d3f37a573e2524207f7bb32f44d4a227cb1e9a555e118d68af7f1e129abd2ac5cabbcd8bbf3551c485bae05108324b

        • \Users\Admin\AppData\Local\n38\sethc.exe

          Filesize

          272KB

          MD5

          3bcb70da9b5a2011e01e35ed29a3f3f3

          SHA1

          9daecb1ee5d7cbcf46ee154dd642fcd993723a9b

          SHA256

          dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5

          SHA512

          69d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df

        • memory/1084-80-0x0000000140000000-0x00000001400F9000-memory.dmp

          Filesize

          996KB

        • memory/1084-76-0x00000000000F0000-0x00000000000F7000-memory.dmp

          Filesize

          28KB

        • memory/1368-29-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-41-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-15-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-17-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-18-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-20-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-24-0x0000000002200000-0x0000000002207000-memory.dmp

          Filesize

          28KB

        • memory/1368-19-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-12-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-10-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-6-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-3-0x0000000077396000-0x0000000077397000-memory.dmp

          Filesize

          4KB

        • memory/1368-30-0x0000000077600000-0x0000000077602000-memory.dmp

          Filesize

          8KB

        • memory/1368-31-0x0000000077630000-0x0000000077632000-memory.dmp

          Filesize

          8KB

        • memory/1368-40-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-16-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-4-0x00000000029E0000-0x00000000029E1000-memory.dmp

          Filesize

          4KB

        • memory/1368-13-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-14-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-8-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-7-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-9-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1368-67-0x0000000077396000-0x0000000077397000-memory.dmp

          Filesize

          4KB

        • memory/1368-11-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/1944-98-0x0000000140000000-0x00000001400F9000-memory.dmp

          Filesize

          996KB

        • memory/2488-62-0x0000000140000000-0x00000001400F9000-memory.dmp

          Filesize

          996KB

        • memory/2488-58-0x0000000140000000-0x00000001400F9000-memory.dmp

          Filesize

          996KB

        • memory/2488-57-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB

        • memory/3008-49-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB

        • memory/3008-0-0x0000000000310000-0x0000000000317000-memory.dmp

          Filesize

          28KB

        • memory/3008-1-0x0000000140000000-0x00000001400F8000-memory.dmp

          Filesize

          992KB