Analysis

  • max time kernel
    149s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28-07-2024 07:47

General

  • Target

    0f3c2af0c1a23bc40eec9f73f691c054_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    0f3c2af0c1a23bc40eec9f73f691c054

  • SHA1

    9b81c96e11542a05ce7b7e57aae15bc5b9aae3e8

  • SHA256

    cf8cfd47e22b61c794f94665ca10aebc9466050a3cedc6489305079f9d1a8e42

  • SHA512

    ae1a29dcff7326980b73de0419620ba7fdeba01a5271687145635a22d5c4aaeb3c62a30263a32a5fd2bbee15088544da443d4045fd71fc58a3e95b0afd39f6d7

  • SSDEEP

    24576:WuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:W9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0f3c2af0c1a23bc40eec9f73f691c054_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1660
  • C:\Windows\system32\lpksetup.exe
    C:\Windows\system32\lpksetup.exe
    1⤵
      PID:2640
    • C:\Users\Admin\AppData\Local\p7HKDXaR\lpksetup.exe
      C:\Users\Admin\AppData\Local\p7HKDXaR\lpksetup.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2784
    • C:\Windows\system32\TpmInit.exe
      C:\Windows\system32\TpmInit.exe
      1⤵
        PID:2152
      • C:\Users\Admin\AppData\Local\gPMqT47W\TpmInit.exe
        C:\Users\Admin\AppData\Local\gPMqT47W\TpmInit.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2532
      • C:\Windows\system32\msra.exe
        C:\Windows\system32\msra.exe
        1⤵
          PID:1304
        • C:\Users\Admin\AppData\Local\sufMgR3R\msra.exe
          C:\Users\Admin\AppData\Local\sufMgR3R\msra.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2796

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\gPMqT47W\ACTIVEDS.dll

          Filesize

          1.2MB

          MD5

          04c4aa4e2ee7b4763338a00330b426d0

          SHA1

          b3591d38147698ff47f07e676ea90f9a8f9ac9ac

          SHA256

          b5bded9484cbefb5280795435e127b9367ace1eff24608031deafa2ed2334121

          SHA512

          c5167bcb439c5bc032dee42cb0cad73e5aa1015c7d9837ff8826e09e52f0c80187e1d658a19823815528ea0f8cd9a34e76100c75d6321f796fa431fd9ad22310

        • C:\Users\Admin\AppData\Local\gPMqT47W\TpmInit.exe

          Filesize

          112KB

          MD5

          8b5eb38e08a678afa129e23129ca1e6d

          SHA1

          a27d30bb04f9fabdb5c92d5150661a75c5c7bc42

          SHA256

          4befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c

          SHA512

          a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d

        • C:\Users\Admin\AppData\Local\p7HKDXaR\lpksetup.exe

          Filesize

          638KB

          MD5

          50d28f3f8b7c17056520c80a29efe17c

          SHA1

          1b1e62be0a0bdc9aec2e91842c35381297d8f01e

          SHA256

          71613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f

          SHA512

          92bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861

        • C:\Users\Admin\AppData\Local\sufMgR3R\msra.exe

          Filesize

          636KB

          MD5

          e79df53bad587e24b3cf965a5746c7b6

          SHA1

          87a97ec159a3fc1db211f3c2c62e4d60810e7a70

          SHA256

          4e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d

          SHA512

          9a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ppapbotpack.lnk

          Filesize

          1KB

          MD5

          048241711b43b0a65638e1a9ce817089

          SHA1

          73490d8e1899483da2a3b0ef33a5f297ae8e234c

          SHA256

          38e0be2f7466d81c47e8cdfd61a2f3c5a88e1fcbd99b0b0be24a2858c52037ff

          SHA512

          91335b28eb24ee3df64478af990fcbdbc13d51a61863c233443f827dfbdf4023ef26e9772d5f1ce9a9ca4cc66519b7dcad27d6b4ee71f851c6b1c84c22e1393b

        • \Users\Admin\AppData\Local\p7HKDXaR\slc.dll

          Filesize

          1.2MB

          MD5

          6e06e03caf7eb3ec945adc73ea008683

          SHA1

          43e92fc918c38cd2a77f874c800b8dac0240e14b

          SHA256

          09d7acfe210b183085cab763a4f23259c0915e8031bb185497cd649371a881b4

          SHA512

          1a5e6903e6e7c4c295642c9e12cc1a8ad9e9629427a0d9451d2f795c553f9f03c5f0fde6d9c7ad477fbee507b4729cbb2f3fac21971ec2907d2658f3e20d382d

        • \Users\Admin\AppData\Local\sufMgR3R\Secur32.dll

          Filesize

          1.2MB

          MD5

          335b347c84d71ef9e103e9fc3eddfd2e

          SHA1

          6e6ce73350b47c49791a9a63897419aa01d5fe45

          SHA256

          f370152bceb1c4a005f698bc8b1100159f98c1e75df2e636b83f503ae41377f1

          SHA512

          f201f28097718f2fb3fa89e2cb5c25b6432312f305d39edb5ffc85611dd7e2837afeabe8098221446c0a196c29feaebe6747f2ff2e2476918990a7f5eba4d708

        • memory/1252-27-0x0000000077631000-0x0000000077632000-memory.dmp

          Filesize

          4KB

        • memory/1252-17-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-25-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-15-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-14-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-13-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-12-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-33-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-10-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-8-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-28-0x00000000777C0000-0x00000000777C2000-memory.dmp

          Filesize

          8KB

        • memory/1252-4-0x0000000077526000-0x0000000077527000-memory.dmp

          Filesize

          4KB

        • memory/1252-26-0x0000000002DC0000-0x0000000002DC7000-memory.dmp

          Filesize

          28KB

        • memory/1252-34-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-5-0x0000000002DE0000-0x0000000002DE1000-memory.dmp

          Filesize

          4KB

        • memory/1252-16-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-7-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-9-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1252-76-0x0000000077526000-0x0000000077527000-memory.dmp

          Filesize

          4KB

        • memory/1252-11-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1660-42-0x000007FEF7B00000-0x000007FEF7C31000-memory.dmp

          Filesize

          1.2MB

        • memory/1660-0-0x000007FEF7B00000-0x000007FEF7C31000-memory.dmp

          Filesize

          1.2MB

        • memory/1660-3-0x00000000001A0000-0x00000000001A7000-memory.dmp

          Filesize

          28KB

        • memory/2532-86-0x000007FEF7B10000-0x000007FEF7C42000-memory.dmp

          Filesize

          1.2MB

        • memory/2532-92-0x000007FEF7B10000-0x000007FEF7C42000-memory.dmp

          Filesize

          1.2MB

        • memory/2532-89-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2784-50-0x000007FEF7C40000-0x000007FEF7D72000-memory.dmp

          Filesize

          1.2MB

        • memory/2784-53-0x0000000000390000-0x0000000000397000-memory.dmp

          Filesize

          28KB

        • memory/2784-55-0x000007FEF7C40000-0x000007FEF7D72000-memory.dmp

          Filesize

          1.2MB

        • memory/2796-107-0x00000000001B0000-0x00000000001B7000-memory.dmp

          Filesize

          28KB

        • memory/2796-109-0x000007FEF7B10000-0x000007FEF7C42000-memory.dmp

          Filesize

          1.2MB