Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 15:56

General

  • Target

    a32e85a3e9c4f38f9b6bc91063dd086c_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    a32e85a3e9c4f38f9b6bc91063dd086c

  • SHA1

    207a0c9c977e931bd533ec62761e9ecee2238ddf

  • SHA256

    9cf326ccaee343e0bd17b36bc073ea0ec4db6dc32f1596d69f018f67f3f30055

  • SHA512

    e1b749cbaec8b8b2f47f9376b2c88eab169735b7516d38ec388c7a54f637293d9adc7784a42b41d780ede176697b2d7f0fcc7df1405e15fead901232dedfa2de

  • SSDEEP

    24576:9uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:X9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a32e85a3e9c4f38f9b6bc91063dd086c_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1444
  • C:\Windows\system32\BitLockerWizard.exe
    C:\Windows\system32\BitLockerWizard.exe
    1⤵
      PID:1724
    • C:\Users\Admin\AppData\Local\mRm6vkhDz\BitLockerWizard.exe
      C:\Users\Admin\AppData\Local\mRm6vkhDz\BitLockerWizard.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1764
    • C:\Windows\system32\perfmon.exe
      C:\Windows\system32\perfmon.exe
      1⤵
        PID:4584
      • C:\Users\Admin\AppData\Local\KxbnC\perfmon.exe
        C:\Users\Admin\AppData\Local\KxbnC\perfmon.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4676
      • C:\Windows\system32\Taskmgr.exe
        C:\Windows\system32\Taskmgr.exe
        1⤵
          PID:4364
        • C:\Users\Admin\AppData\Local\yw7\Taskmgr.exe
          C:\Users\Admin\AppData\Local\yw7\Taskmgr.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1268

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\KxbnC\credui.dll

          Filesize

          1.2MB

          MD5

          da7c25c6f2bbb171687375abbe9b6bba

          SHA1

          e106cd0f49d1558fc4591c23195c57235634e450

          SHA256

          972320c520ae19dbc0d5ea350cab556103e40966c3d7a29ebf3f96191ac5d938

          SHA512

          093f1c5657eb16ccb96d07f61ffa8afb20a7e64fd8490352a18482e8b34ce65c32bf56032a2bb30dc68b153e0b466046b1e6719043007dde056d9e25a9fd4ccf

        • C:\Users\Admin\AppData\Local\KxbnC\perfmon.exe

          Filesize

          177KB

          MD5

          d38aa59c3bea5456bd6f95c73ad3c964

          SHA1

          40170eab389a6ba35e949f9c92962646a302d9ef

          SHA256

          5f041cff346fb37e5c5c9dab3c1272c76f8b5f579205170e97d2248d04a4ea0c

          SHA512

          59fa552a46e5d6237c7244b03d09d60e9489217b4319a212e822c73fe1f31a81837cb906ae7da92072bd3d9263fe0b967e073110ba81da3a90126f25115fff68

        • C:\Users\Admin\AppData\Local\mRm6vkhDz\BitLockerWizard.exe

          Filesize

          100KB

          MD5

          6d30c96f29f64b34bc98e4c81d9b0ee8

          SHA1

          4a3adc355f02b9c69bdbe391bfb01469dee15cf0

          SHA256

          7758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74

          SHA512

          25471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8

        • C:\Users\Admin\AppData\Local\mRm6vkhDz\FVEWIZ.dll

          Filesize

          1.2MB

          MD5

          782c063c3f8abb72670dc6ad81b5821a

          SHA1

          79c62d71fa2bdc23faf2de52f1b8a75d2ef22ac3

          SHA256

          0d6188f167941fdf1024e1dc6c8928c8794d017ba6c97452efafb529333d417c

          SHA512

          93f02675e9a61fe1bf45eba3fcd33edbedf6d0bdd9b479110dc6e90b3ec9e28a85fbb147b3dfbb222dd147160fa813d4d2ac1cb089da6cb4513da1542848d54c

        • C:\Users\Admin\AppData\Local\yw7\Taskmgr.exe

          Filesize

          1.2MB

          MD5

          58d5bc7895f7f32ee308e34f06f25dd5

          SHA1

          7a7f5e991ddeaf73e15a0fdcb5c999c0248a2fa4

          SHA256

          4e305198f15bafd5728b5fb8e7ff48d9f312399c744ecfea0ecac79d93c5e478

          SHA512

          872c84c92b0e4050ae4a4137330ec3cda30008fd15d6413bf7a913c03a021ad41b6131e5a7356b374ced98d37ae207147ebefd93893560dc15c3e9875f93f7a9

        • C:\Users\Admin\AppData\Local\yw7\dxgi.dll

          Filesize

          1.2MB

          MD5

          a95f03b1724a55dfcd2b019d43661126

          SHA1

          56a713467f8e88c2892bb1d52961d3b76879896a

          SHA256

          6acf7b7d5d981069901fd23e7c8598032a114c24c607d8971a19281b03ced3b7

          SHA512

          7baa8bf2db5b42ef08623b7136aef45f66715732c2f564f01e97ec93bef4aac0be24ed09861d983257935cb0f935d43d411e305d0968e661c7ca299d3a366fdf

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Plbydas.lnk

          Filesize

          1KB

          MD5

          5b4779c4f858171ebb623c3267865217

          SHA1

          2dce27e88dc5452a90cf808c2e529cb91021433a

          SHA256

          9c66f5f84a3338e564a6472e37d50653d5c1cf772ca00651bceedf03bc3073be

          SHA512

          d46c910170ef237416f3aa41ec3e3da1198a68c7dfc503c0c2d1cbeabd8b9a4f4772fd340eb402c0238f5c6a862f801819dd5ac9cd61da826c8ad1d035137f98

        • memory/1268-80-0x00007FFC5C970000-0x00007FFC5CAA1000-memory.dmp

          Filesize

          1.2MB

        • memory/1268-85-0x00007FFC5C970000-0x00007FFC5CAA1000-memory.dmp

          Filesize

          1.2MB

        • memory/1444-38-0x00007FFC6C6D0000-0x00007FFC6C800000-memory.dmp

          Filesize

          1.2MB

        • memory/1444-3-0x0000023B7F250000-0x0000023B7F257000-memory.dmp

          Filesize

          28KB

        • memory/1444-0-0x00007FFC6C6D0000-0x00007FFC6C800000-memory.dmp

          Filesize

          1.2MB

        • memory/1764-51-0x00007FFC5D660000-0x00007FFC5D791000-memory.dmp

          Filesize

          1.2MB

        • memory/1764-46-0x00007FFC5D660000-0x00007FFC5D791000-memory.dmp

          Filesize

          1.2MB

        • memory/1764-45-0x000001BD5AFE0000-0x000001BD5AFE7000-memory.dmp

          Filesize

          28KB

        • memory/3464-29-0x00007FFC7AED0000-0x00007FFC7AEE0000-memory.dmp

          Filesize

          64KB

        • memory/3464-28-0x0000000003800000-0x0000000003807000-memory.dmp

          Filesize

          28KB

        • memory/3464-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-17-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-35-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-5-0x00007FFC7981A000-0x00007FFC7981B000-memory.dmp

          Filesize

          4KB

        • memory/3464-4-0x00000000077F0000-0x00000000077F1000-memory.dmp

          Filesize

          4KB

        • memory/3464-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/4676-68-0x00007FFC5D600000-0x00007FFC5D731000-memory.dmp

          Filesize

          1.2MB

        • memory/4676-62-0x00007FFC5D600000-0x00007FFC5D731000-memory.dmp

          Filesize

          1.2MB

        • memory/4676-65-0x000001A1B0FF0000-0x000001A1B0FF7000-memory.dmp

          Filesize

          28KB