Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29-07-2024 01:50

General

  • Target

    31a99257d7f59c024665683ec80d1f5f_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    31a99257d7f59c024665683ec80d1f5f

  • SHA1

    61d6669a7e007b64b69bdf93d0a39f232fc3e7e4

  • SHA256

    8cc5917a2fe27efc03ea4cdcc77b00fa7a8551f38d393735ebc0923a87961edd

  • SHA512

    c4fd03de3aedf2ae3bc58a744080b13ade5b66617046b33458ab11fc77b22d743f7144eb7705e97be0bad7a0844f643e5af901d07a1eab50ea8de79cc4c6da79

  • SSDEEP

    24576:vuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:R9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\31a99257d7f59c024665683ec80d1f5f_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1820
  • C:\Windows\system32\EhStorAuthn.exe
    C:\Windows\system32\EhStorAuthn.exe
    1⤵
      PID:2772
    • C:\Users\Admin\AppData\Local\DOp\EhStorAuthn.exe
      C:\Users\Admin\AppData\Local\DOp\EhStorAuthn.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3032
    • C:\Windows\system32\irftp.exe
      C:\Windows\system32\irftp.exe
      1⤵
        PID:836
      • C:\Users\Admin\AppData\Local\vRf\irftp.exe
        C:\Users\Admin\AppData\Local\vRf\irftp.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1424
      • C:\Windows\system32\calc.exe
        C:\Windows\system32\calc.exe
        1⤵
          PID:1448
        • C:\Users\Admin\AppData\Local\dWlZ8NQ7I\calc.exe
          C:\Users\Admin\AppData\Local\dWlZ8NQ7I\calc.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2992

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\DOp\UxTheme.dll

          Filesize

          1.2MB

          MD5

          c0ae21402095dec91e5a81a5343f0bd6

          SHA1

          6894845066a9102f815da97b46013ba52814d0a5

          SHA256

          212b6cc4b2740f6561000f11061a8b2c0828f1bc36b67f2a03713cee10e9d837

          SHA512

          afeb434843c09870eae6f2fe6ea156530ae06e59740915259deaeee566d43247151bbfc9e8cd45cc671193bac0246e54fe049d5f52bff65a2f7950966ade01e1

        • C:\Users\Admin\AppData\Local\vRf\WTSAPI32.dll

          Filesize

          1.2MB

          MD5

          448dce67366df3349e4f6b9d1f9313b6

          SHA1

          6480190fb7c5f131d8862f37afd37fcb2f8933f6

          SHA256

          3f17fa678cc16efcc039ae801d14824b781bab09e5691d3962d32f329b29dee9

          SHA512

          200837aaa419a1935ba5fbebf859ad8ddcb4fb1d2c4b008601654b3f6d38fe2cf58164ea95b79f7229c36aefb967e881c9476c31b18a7bcf3d7a4f3ca4c8ea6e

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Nhelokvclymi.lnk

          Filesize

          1KB

          MD5

          c6f7ec8aba6d22b18b95e712c5ebc7c5

          SHA1

          a81136ef7945bc33f8c569ca1ff42307be5af9e8

          SHA256

          f635a2867529ac9124f64b7fbe9b8c2d67d9c175a0ac943b09e772b3cef22e56

          SHA512

          f9ce59e273b2034d1315aab30d66be7a160fa2f13fc547eea3238b60b993a7874a44e3d006322b41844c3588af9b64a47094e4e92cee349eb01e97a08ba870c3

        • \Users\Admin\AppData\Local\DOp\EhStorAuthn.exe

          Filesize

          137KB

          MD5

          3abe95d92c80dc79707d8e168d79a994

          SHA1

          64b10c17f602d3f21c84954541e7092bc55bb5ab

          SHA256

          2159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad

          SHA512

          70fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c

        • \Users\Admin\AppData\Local\dWlZ8NQ7I\VERSION.dll

          Filesize

          1.2MB

          MD5

          3b27380ad32fd0fd896ccbd36731e43f

          SHA1

          e501236a67af5f9fff7feb05655d2cc03bbbdf29

          SHA256

          61561b077a8007b13f56ca32e57faafcd287b40727d90bc22fa85dd7cecbe732

          SHA512

          7d1fe2cc7d1582b5c500e1c085042f2eeccf21798e7cbccacaab96ccf8bc0f083a25e90f24b8288f3feb3c1e1d3d813b8886f622147cbc22889d5d67d168da19

        • \Users\Admin\AppData\Local\dWlZ8NQ7I\calc.exe

          Filesize

          897KB

          MD5

          10e4a1d2132ccb5c6759f038cdb6f3c9

          SHA1

          42d36eeb2140441b48287b7cd30b38105986d68f

          SHA256

          c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b

          SHA512

          9bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d

        • \Users\Admin\AppData\Local\vRf\irftp.exe

          Filesize

          192KB

          MD5

          0cae1fb725c56d260bfd6feba7ae9a75

          SHA1

          102ac676a1de3ec3d56401f8efd518c31c8b0b80

          SHA256

          312f4107ff37dc988d99c5f56178708bb74a3906740cff4e337c0dde8f1e151d

          SHA512

          db969064577c4158d6bf925354319766b0d0373ddefb03dbfc9a9d2cadf8ddcd50a7f99b7ddf2ffad5e7fdbb6f02090b5b678bdf792d265054bff3b56ee0b8ec

        • memory/1200-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-4-0x0000000077696000-0x0000000077697000-memory.dmp

          Filesize

          4KB

        • memory/1200-25-0x0000000002540000-0x0000000002547000-memory.dmp

          Filesize

          28KB

        • memory/1200-27-0x0000000077A30000-0x0000000077A32000-memory.dmp

          Filesize

          8KB

        • memory/1200-26-0x00000000778A1000-0x00000000778A2000-memory.dmp

          Filesize

          4KB

        • memory/1200-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-36-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-37-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-5-0x0000000002560000-0x0000000002561000-memory.dmp

          Filesize

          4KB

        • memory/1200-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1200-64-0x0000000077696000-0x0000000077697000-memory.dmp

          Filesize

          4KB

        • memory/1424-72-0x000007FEF63B0000-0x000007FEF64E1000-memory.dmp

          Filesize

          1.2MB

        • memory/1424-75-0x00000000002B0000-0x00000000002B7000-memory.dmp

          Filesize

          28KB

        • memory/1424-78-0x000007FEF63B0000-0x000007FEF64E1000-memory.dmp

          Filesize

          1.2MB

        • memory/1820-45-0x000007FEF6840000-0x000007FEF6970000-memory.dmp

          Filesize

          1.2MB

        • memory/1820-0-0x00000000003A0000-0x00000000003A7000-memory.dmp

          Filesize

          28KB

        • memory/1820-1-0x000007FEF6840000-0x000007FEF6970000-memory.dmp

          Filesize

          1.2MB

        • memory/2992-90-0x0000000000310000-0x0000000000317000-memory.dmp

          Filesize

          28KB

        • memory/2992-91-0x000007FEF6830000-0x000007FEF6961000-memory.dmp

          Filesize

          1.2MB

        • memory/2992-96-0x000007FEF6830000-0x000007FEF6961000-memory.dmp

          Filesize

          1.2MB

        • memory/3032-59-0x000007FEF6F00000-0x000007FEF7031000-memory.dmp

          Filesize

          1.2MB

        • memory/3032-56-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/3032-53-0x000007FEF6F00000-0x000007FEF7031000-memory.dmp

          Filesize

          1.2MB