Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2024 02:45

General

  • Target

    3419fa482b6568b8f57a109c37efbb6a_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    3419fa482b6568b8f57a109c37efbb6a

  • SHA1

    b7e9b700a063409acebaf68978058ccd1483a3b4

  • SHA256

    de941aa21b4dc90656dc241719d3ce01cf582dc24404c2abec1c390b6214186c

  • SHA512

    7d0fba934c86b69c988bf8ab8126099ec67d55d61135d96181695fa0d8d40fd048b587660fb45b1f6fe90819299b5e0a48d943f921eacdfa12637b2c44774c7c

  • SSDEEP

    24576:RuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:D9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3419fa482b6568b8f57a109c37efbb6a_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:3716
  • C:\Windows\system32\DmNotificationBroker.exe
    C:\Windows\system32\DmNotificationBroker.exe
    1⤵
      PID:860
    • C:\Users\Admin\AppData\Local\71X\DmNotificationBroker.exe
      C:\Users\Admin\AppData\Local\71X\DmNotificationBroker.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:512
    • C:\Windows\system32\wbengine.exe
      C:\Windows\system32\wbengine.exe
      1⤵
        PID:4964
      • C:\Users\Admin\AppData\Local\xQE\wbengine.exe
        C:\Users\Admin\AppData\Local\xQE\wbengine.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3280
      • C:\Windows\system32\dialer.exe
        C:\Windows\system32\dialer.exe
        1⤵
          PID:5020
        • C:\Users\Admin\AppData\Local\s5J9mJ\dialer.exe
          C:\Users\Admin\AppData\Local\s5J9mJ\dialer.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1000

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\71X\DUI70.dll

          Filesize

          1.4MB

          MD5

          63b10d8790480f55f2226b5b3d63bf2c

          SHA1

          aaa43ee96ad4faec2267d2f1193b7b5d7b793c91

          SHA256

          237bfeb2544b6377e5f598e1e56df795e45594e7ecf467d5df12358bfbc6caf3

          SHA512

          2abdb46c168ae2d3a1f8efdfa71d29af1e987f4b114fc235c45f2bd50b2d65c3a0959ab2a368540f5fd4a4d6d9cdfdd44dba26d556ca5b66df7f295852612046

        • C:\Users\Admin\AppData\Local\71X\DmNotificationBroker.exe

          Filesize

          32KB

          MD5

          f0bdc20540d314a2aad951c7e2c88420

          SHA1

          4ab344595a4a81ab5f31ed96d72f217b4cee790b

          SHA256

          f87537e5f26193a2273380f86cc9ac16d977f65b0eff2435e40be830fd99f7b5

          SHA512

          cb69e35b2954406735264a4ae8fe1eca1bd4575f553ab2178c70749ab997bda3c06496d2fce97872c51215a19093e51eea7cc8971af62ad9d5726f3a0d2730aa

        • C:\Users\Admin\AppData\Local\s5J9mJ\TAPI32.dll

          Filesize

          1.2MB

          MD5

          ab9b5129126352678ce19fe003f217cc

          SHA1

          ac6057a5b5b9b3009879621a7745b71b6df09eb1

          SHA256

          aa19e0ee6675398595baa9cb52e91f21e15a3f8c992648f1aacd35e688e874fc

          SHA512

          0751b92b473533a14de34bd8a7233779bfd16482cb98fd6c8f370b5e68efda30e780e4c906acc3772be0e8b9c76e50cfe674f3bc0ef483db885b04e5df2f1849

        • C:\Users\Admin\AppData\Local\s5J9mJ\dialer.exe

          Filesize

          39KB

          MD5

          b2626bdcf079c6516fc016ac5646df93

          SHA1

          838268205bd97d62a31094d53643c356ea7848a6

          SHA256

          e3ac5e6196f3a98c1946d85c653866c318bb2a86dd865deffa7b52f665d699bb

          SHA512

          615cfe1f91b895513c687906bf3439ca352afcadd3b73f950af0a3b5fb1b358168a7a25a6796407b212fde5f803dd880bcdc350d8bac7e7594090d37ce259971

        • C:\Users\Admin\AppData\Local\xQE\wbengine.exe

          Filesize

          1.5MB

          MD5

          17270a354a66590953c4aac1cf54e507

          SHA1

          715babcc8e46b02ac498f4f06df7937904d9798d

          SHA256

          9954394b43783061f9290706320cc65597c29176d5b8e7a26fa1d6b3536832b4

          SHA512

          6be0ba6be84d01ab47f5a4ca98a6b940c43bd2d1e1a273d41c3e88aca47da11d932024b007716d1a6ffe6cee396b0e3e6971ab2afc293e72472f2e61c17b2a89

        • C:\Users\Admin\AppData\Local\xQE\wer.dll

          Filesize

          1.2MB

          MD5

          77b01fd98fed32181d77d9e23452adf0

          SHA1

          08baf7b84a5dde901cf94bd180f15ff4e0ecc36a

          SHA256

          0d7065387e00362afd8f71931b322adb63a593770b87f4eee8199301e128103f

          SHA512

          193ca3bd58db4f394aea8852249f254cb0242e2dbc494074a86e47510425bcda2425687160d535adab8bc2625dda741ce9f076bda1b66743ebb57d9e33bacd36

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Rlbqg.lnk

          Filesize

          1KB

          MD5

          36c58fdddd892925adf3d9fd10ee9e08

          SHA1

          a881e3952fb3938b85eb30b98c73edcf0b688d14

          SHA256

          75361420963ba7eca3d7c7555ddd520974e9765dcafdb84bbbd00413be56cb82

          SHA512

          2750613e691ca425a5b09132214b634b7a8adafd631ed996dccc3229271713e6f8eb44bbedc8d1634d38f00a7e5917d514f4ec6037261c479a91537241441a5f

        • memory/512-49-0x00000140317F0000-0x00000140317F7000-memory.dmp

          Filesize

          28KB

        • memory/512-46-0x00007FF8D57A0000-0x00007FF8D5917000-memory.dmp

          Filesize

          1.5MB

        • memory/512-52-0x00007FF8D57A0000-0x00007FF8D5917000-memory.dmp

          Filesize

          1.5MB

        • memory/1000-83-0x0000021DD0B60000-0x0000021DD0B67000-memory.dmp

          Filesize

          28KB

        • memory/1000-86-0x00007FF7504C0000-0x00007FF7504CF000-memory.dmp

          Filesize

          60KB

        • memory/1000-87-0x00007FF8D5D40000-0x00007FF8D5E73000-memory.dmp

          Filesize

          1.2MB

        • memory/3280-63-0x00007FF8D5D40000-0x00007FF8D5E73000-memory.dmp

          Filesize

          1.2MB

        • memory/3280-66-0x000001D9013C0000-0x000001D9013C7000-memory.dmp

          Filesize

          28KB

        • memory/3280-69-0x00007FF8D5D40000-0x00007FF8D5E73000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-16-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-13-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-37-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-4-0x00000000016A0000-0x00000000016A1000-memory.dmp

          Filesize

          4KB

        • memory/3432-7-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-8-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-9-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-10-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-12-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-6-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-15-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-11-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-32-0x00007FF8E218A000-0x00007FF8E218B000-memory.dmp

          Filesize

          4KB

        • memory/3432-33-0x00000000013E0000-0x00000000013E7000-memory.dmp

          Filesize

          28KB

        • memory/3432-34-0x00007FF8E4090000-0x00007FF8E40A0000-memory.dmp

          Filesize

          64KB

        • memory/3432-24-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-14-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3716-1-0x00000202AF370000-0x00000202AF377000-memory.dmp

          Filesize

          28KB

        • memory/3716-39-0x00007FF8D5D40000-0x00007FF8D5E71000-memory.dmp

          Filesize

          1.2MB

        • memory/3716-0-0x00007FF8D5D40000-0x00007FF8D5E71000-memory.dmp

          Filesize

          1.2MB