Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 14:58

General

  • Target

    afb00d38603a12de72531ad560e85254_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    afb00d38603a12de72531ad560e85254

  • SHA1

    f7b662d6bfbf3821b03f572deec18a07b7e8f175

  • SHA256

    c51312f6ea110b81ae4ddec3ee994b9cd14b800568ab4e0e99a903f4c77fb9aa

  • SHA512

    b6993eff1aa74e7b4f03882b20759469eb807511f4c9d02fdc939a44b1ff04b7217dd80037a8caa205c9d784cad6d840a5867026f84bbd3390ad63cc12b903d2

  • SSDEEP

    24576:uuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:O9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\afb00d38603a12de72531ad560e85254_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2408
  • C:\Windows\system32\Dxpserver.exe
    C:\Windows\system32\Dxpserver.exe
    1⤵
      PID:2184
    • C:\Users\Admin\AppData\Local\rthy\Dxpserver.exe
      C:\Users\Admin\AppData\Local\rthy\Dxpserver.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2620
    • C:\Windows\system32\javaws.exe
      C:\Windows\system32\javaws.exe
      1⤵
        PID:2500
      • C:\Users\Admin\AppData\Local\K0jro\javaws.exe
        C:\Users\Admin\AppData\Local\K0jro\javaws.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2516
      • C:\Windows\system32\msconfig.exe
        C:\Windows\system32\msconfig.exe
        1⤵
          PID:1516
        • C:\Users\Admin\AppData\Local\gznKXF\msconfig.exe
          C:\Users\Admin\AppData\Local\gznKXF\msconfig.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1716

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\K0jro\VERSION.dll

          Filesize

          1.2MB

          MD5

          e5091d839a237e9545d34eaf7d462d51

          SHA1

          c04282973e0883974140ac3ed5fc287415838b2d

          SHA256

          c63ba42e345d8202fb10f33ec07cdbe9547e1b9b37ea4b77b44d5d74ae798266

          SHA512

          a4c7c881db217763b824b48b8d6cdbc04fa0ab68caaa375c287e968ba53c3c4004f02767f00be651b84152bf6511a5a07b8b081150427ccda2d3c3f04f1d12c8

        • C:\Users\Admin\AppData\Local\gznKXF\VERSION.dll

          Filesize

          1.2MB

          MD5

          202e0105273514f6de7a119b88006fc2

          SHA1

          ba633e01bedcdbc8372141e8a31dce89b27331fb

          SHA256

          c7715279d923cc8da4b84016ef863a0f21d64f01f6712ef55b01fe5696cb3bbf

          SHA512

          5588d21fc4797ab9b3a389e119fc3466e1498a3f923131745f889d6e7bcb0391255126c15f535de439904eb1f556f7bbe94c0dd8912417e23852281d05bd99fd

        • C:\Users\Admin\AppData\Local\rthy\Dxpserver.exe

          Filesize

          259KB

          MD5

          4d38389fb92e43c77a524fd96dbafd21

          SHA1

          08014e52f6894cad4f1d1e6fc1a703732e9acd19

          SHA256

          070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73

          SHA512

          02d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba

        • C:\Users\Admin\AppData\Local\rthy\XmlLite.dll

          Filesize

          1.2MB

          MD5

          afb0ea894372c3e393e5d5cadf2fcac3

          SHA1

          6d34830dbe5abfcc35d6cad86476b5ee4703d5c2

          SHA256

          5d031155aedfe7f6d2bc1ce666bf2b9e67f732d2002e75aef50ea18b414511af

          SHA512

          ebfcfb6c6f3441e1684782c26622c4792a538617db870579e03f2c62315ada33c979309be1670001004720c14ad6aa900d838df96a2ac86c60c72c9c3b65e79d

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Mityoyoyxpr.lnk

          Filesize

          1KB

          MD5

          bf8f5b5812929bd3d93f25ab7bf76316

          SHA1

          9f2adde6b7e9fa3f40ff06efcc7407ab19945ce1

          SHA256

          be122962cbdff4080b9e1e29ca63b654688abed4a7c0f0f6fdc1c8bab5982016

          SHA512

          97383880ec195aa8adafefb4d90ced9e0358add09f17b5ac9a735339b5ac8d12ca889f49825fd9b698fff9f55a66bfe351cf81923bcdfd6a07de56b0cbed8596

        • \Users\Admin\AppData\Local\K0jro\javaws.exe

          Filesize

          312KB

          MD5

          f94bc1a70c942621c4279236df284e04

          SHA1

          8f46d89c7db415a7f48ccd638963028f63df4e4f

          SHA256

          be9f8986a6c86d9f77978105d48b59eebfec3b9732dbf19e0f3d48bf7f20120c

          SHA512

          60edf20ca3cae9802263446af266568d0b5e0692eddcfcfc3b2f9a39327b3184613ca994460b919d17a6edc5936b4da16d9033f5138bcfd9bc0f09d88c8dcd52

        • \Users\Admin\AppData\Local\gznKXF\msconfig.exe

          Filesize

          293KB

          MD5

          e19d102baf266f34592f7c742fbfa886

          SHA1

          c9c9c45b7e97bb7a180064d0a1962429f015686d

          SHA256

          f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1

          SHA512

          1b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283

        • memory/1204-13-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-47-0x0000000076E66000-0x0000000076E67000-memory.dmp

          Filesize

          4KB

        • memory/1204-12-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-11-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-26-0x0000000002640000-0x0000000002647000-memory.dmp

          Filesize

          28KB

        • memory/1204-28-0x0000000077200000-0x0000000077202000-memory.dmp

          Filesize

          8KB

        • memory/1204-27-0x0000000077071000-0x0000000077072000-memory.dmp

          Filesize

          4KB

        • memory/1204-25-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-17-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-16-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-14-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-4-0x0000000076E66000-0x0000000076E67000-memory.dmp

          Filesize

          4KB

        • memory/1204-37-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-38-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-5-0x0000000002660000-0x0000000002661000-memory.dmp

          Filesize

          4KB

        • memory/1204-7-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-8-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-15-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-10-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1204-9-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1716-91-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB

        • memory/1716-92-0x000007FEF5B30000-0x000007FEF5C62000-memory.dmp

          Filesize

          1.2MB

        • memory/1716-97-0x000007FEF5B30000-0x000007FEF5C62000-memory.dmp

          Filesize

          1.2MB

        • memory/2408-46-0x000007FEF6110000-0x000007FEF6241000-memory.dmp

          Filesize

          1.2MB

        • memory/2408-0-0x000007FEF6110000-0x000007FEF6241000-memory.dmp

          Filesize

          1.2MB

        • memory/2408-3-0x0000000000130000-0x0000000000137000-memory.dmp

          Filesize

          28KB

        • memory/2516-73-0x00000000000F0000-0x00000000000F7000-memory.dmp

          Filesize

          28KB

        • memory/2516-74-0x000007FEF6110000-0x000007FEF6242000-memory.dmp

          Filesize

          1.2MB

        • memory/2516-79-0x000007FEF6110000-0x000007FEF6242000-memory.dmp

          Filesize

          1.2MB

        • memory/2620-55-0x000007FEF6760000-0x000007FEF6892000-memory.dmp

          Filesize

          1.2MB

        • memory/2620-58-0x00000000002A0000-0x00000000002A7000-memory.dmp

          Filesize

          28KB

        • memory/2620-61-0x000007FEF6760000-0x000007FEF6892000-memory.dmp

          Filesize

          1.2MB