Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-07-2024 23:52

General

  • Target

    2c083f8ebf66a7c0ead55769be9f6585_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    2c083f8ebf66a7c0ead55769be9f6585

  • SHA1

    cefc2e8de8b5d48136afb11147374028cac9cddb

  • SHA256

    33dc43b0e4574bbc29a2f77c51fd830184c8b3c2f9ae34c4b9a762e44b8b5b82

  • SHA512

    b3a9c52ca44616593d8a6c72bde20962a20ee71ae0f5c9c886d797d89c5f3dc7d9834865cf829dac10f00dad867d69c8369755fdccaa14d8b8df698dd7963f5b

  • SSDEEP

    24576:guYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:w9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2c083f8ebf66a7c0ead55769be9f6585_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1748
  • C:\Windows\system32\slui.exe
    C:\Windows\system32\slui.exe
    1⤵
      PID:3008
    • C:\Users\Admin\AppData\Local\DhNs\slui.exe
      C:\Users\Admin\AppData\Local\DhNs\slui.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:376
    • C:\Windows\system32\DevicePairingWizard.exe
      C:\Windows\system32\DevicePairingWizard.exe
      1⤵
        PID:1492
      • C:\Users\Admin\AppData\Local\I6VbAt\DevicePairingWizard.exe
        C:\Users\Admin\AppData\Local\I6VbAt\DevicePairingWizard.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2988
      • C:\Windows\system32\sdclt.exe
        C:\Windows\system32\sdclt.exe
        1⤵
          PID:1060
        • C:\Users\Admin\AppData\Local\yPk\sdclt.exe
          C:\Users\Admin\AppData\Local\yPk\sdclt.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2664

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\DhNs\slc.dll

          Filesize

          1.2MB

          MD5

          2c14734c6e0421503b20a90e832767b4

          SHA1

          0ae9c7a5b972bc581a2e86e670f3986264e72577

          SHA256

          bbaece99521dcd537f4f64ae502a984db34c9794855a1684279a5ebd6ba75289

          SHA512

          f9f04168833c72807a7ef52a7c4bd1fbf22f0e44fa5a7b9502a6d74cb895b5f7d551ba9d6f7dbf773a4a2976f08477bd973b614fecd0d0a88b67d9d1639710e0

        • C:\Users\Admin\AppData\Local\I6VbAt\DevicePairingWizard.exe

          Filesize

          73KB

          MD5

          9728725678f32e84575e0cd2d2c58e9b

          SHA1

          dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c

          SHA256

          d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544

          SHA512

          a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377

        • C:\Users\Admin\AppData\Local\I6VbAt\MFC42u.dll

          Filesize

          1.2MB

          MD5

          d64fff489848373c4a46680e89121f1f

          SHA1

          533acddeeb0320546037924c2660fe2ba21eecde

          SHA256

          8696c01fe9427cf7bf30aaa7970cb539b52a98bf290f6c79352111744fc06084

          SHA512

          8ca7434f3d1576e2457a8a073bf5fe132d2ee8cbf34574755e7a8e0ca6e79955b867d778c00d7103746a591d30125b32cdf531d6af89329321db65a46cba7078

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ygxjfqh.lnk

          Filesize

          1KB

          MD5

          f0dff40cfc9f7443c1d2eb018324fae5

          SHA1

          f3f012e44bb7580e7a20876de22c8f82c1466f32

          SHA256

          7c0256c943ce76eaf8c9e3168e4016f041afc336292d99af6b378e4d1dc96725

          SHA512

          c38ae0641e7c67b9d269e436839aa5e02e71de4a544210dd89e1161af2fcdc31fa6756d02307b968fab24e8017a79b102183263f7085c8a4f6ebfbc671bbdfd2

        • \Users\Admin\AppData\Local\DhNs\slui.exe

          Filesize

          341KB

          MD5

          c5ce5ce799387e82b7698a0ee5544a6d

          SHA1

          ed37fdb169bb539271c117d3e8a5f14fd8df1c0d

          SHA256

          34aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c

          SHA512

          79453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c

        • \Users\Admin\AppData\Local\yPk\UxTheme.dll

          Filesize

          1.2MB

          MD5

          ed88ca758802a5690962ce15c1f34b3e

          SHA1

          ff93049060fbe62fa98a0646f6b88fd13d1add52

          SHA256

          ac8a4f5ba25af0f930befb7a42e76b54d06652f1c4e6ca03785caad5db21fd35

          SHA512

          8c4944935961cdc4ec61c42dedb116ad4e7bb41f6a347b2fc28b01035b52a623db5c8cadb92fda98f2551828a448e6f55886dd04d08203d1d763153796ee4167

        • \Users\Admin\AppData\Local\yPk\sdclt.exe

          Filesize

          1.2MB

          MD5

          cdebd55ffbda3889aa2a8ce52b9dc097

          SHA1

          4b3cbfff5e57fa0cb058e93e445e3851063646cf

          SHA256

          61bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd

          SHA512

          2af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13

        • memory/376-60-0x000007FEF6610000-0x000007FEF6742000-memory.dmp

          Filesize

          1.2MB

        • memory/376-57-0x0000000000130000-0x0000000000137000-memory.dmp

          Filesize

          28KB

        • memory/376-54-0x000007FEF6610000-0x000007FEF6742000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-11-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-15-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-25-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-17-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-16-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-14-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-13-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-28-0x0000000077170000-0x0000000077172000-memory.dmp

          Filesize

          8KB

        • memory/1236-27-0x0000000076FE1000-0x0000000076FE2000-memory.dmp

          Filesize

          4KB

        • memory/1236-37-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-38-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-4-0x0000000076DD6000-0x0000000076DD7000-memory.dmp

          Filesize

          4KB

        • memory/1236-12-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-5-0x00000000024B0000-0x00000000024B1000-memory.dmp

          Filesize

          4KB

        • memory/1236-8-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-26-0x0000000002490000-0x0000000002497000-memory.dmp

          Filesize

          28KB

        • memory/1236-9-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-10-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-7-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-75-0x0000000076DD6000-0x0000000076DD7000-memory.dmp

          Filesize

          4KB

        • memory/1748-1-0x000007FEF6080000-0x000007FEF61B1000-memory.dmp

          Filesize

          1.2MB

        • memory/1748-46-0x000007FEF6080000-0x000007FEF61B1000-memory.dmp

          Filesize

          1.2MB

        • memory/1748-0-0x00000000001A0000-0x00000000001A7000-memory.dmp

          Filesize

          28KB

        • memory/2664-91-0x000007FEF6080000-0x000007FEF61B2000-memory.dmp

          Filesize

          1.2MB

        • memory/2664-94-0x00000000002A0000-0x00000000002A7000-memory.dmp

          Filesize

          28KB

        • memory/2664-97-0x000007FEF6080000-0x000007FEF61B2000-memory.dmp

          Filesize

          1.2MB

        • memory/2988-76-0x00000000000F0000-0x00000000000F7000-memory.dmp

          Filesize

          28KB

        • memory/2988-72-0x000007FEF6080000-0x000007FEF61B8000-memory.dmp

          Filesize

          1.2MB

        • memory/2988-79-0x000007FEF6080000-0x000007FEF61B8000-memory.dmp

          Filesize

          1.2MB