Analysis

  • max time kernel
    150s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 07:17

General

  • Target

    b28fbffaca9e1074a6b02f7aa96f4ca4_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    b28fbffaca9e1074a6b02f7aa96f4ca4

  • SHA1

    832224f36aa0dc4386000d1783d46dbd1c99fe36

  • SHA256

    fb0cfe24560a2dceaf2d198ffb4ebd793ee92fdedaaf63f54a32addd92728599

  • SHA512

    c14b11357ac2d9657d0186a695a54072e55e598e8dd2f78b789001e8c5d7854a4fbf4cdddf3eb5a86daf8f42da6d7bfe16d4f29997c34c0d6023d0bfcc680bb0

  • SSDEEP

    24576:xuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:j9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b28fbffaca9e1074a6b02f7aa96f4ca4_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2388
  • C:\Windows\system32\xpsrchvw.exe
    C:\Windows\system32\xpsrchvw.exe
    1⤵
      PID:2604
    • C:\Users\Admin\AppData\Local\74Y2qN\xpsrchvw.exe
      C:\Users\Admin\AppData\Local\74Y2qN\xpsrchvw.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2632
    • C:\Windows\system32\ComputerDefaults.exe
      C:\Windows\system32\ComputerDefaults.exe
      1⤵
        PID:1728
      • C:\Users\Admin\AppData\Local\wJD4H10n\ComputerDefaults.exe
        C:\Users\Admin\AppData\Local\wJD4H10n\ComputerDefaults.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2508
      • C:\Windows\system32\UI0Detect.exe
        C:\Windows\system32\UI0Detect.exe
        1⤵
          PID:2360
        • C:\Users\Admin\AppData\Local\xNXy\UI0Detect.exe
          C:\Users\Admin\AppData\Local\xNXy\UI0Detect.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1700

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\74Y2qN\WINMM.dll

          Filesize

          1.2MB

          MD5

          90f9e2fcc30bfbc9f34dd16cb127c5e5

          SHA1

          f7a7f6f39749987c5dc7fa7eb5fca4e9c538ed74

          SHA256

          4414ad2b93522de89e2654f10684faf02204faf442c23ac12639dbbe7cb4cf04

          SHA512

          1c9b8023ebe5c5b21236878ff77179d03a8307ba82a30c997943b63c33a806fe5bafe85c137a6128c3235ae596e8a3c1188651b7c7a9b991079237ebf8ac06ca

        • C:\Users\Admin\AppData\Local\wJD4H10n\appwiz.cpl

          Filesize

          1.2MB

          MD5

          cce8643208ac76a65356fce2e31a281e

          SHA1

          c33b4909fa074f17d3b7e71cc3bb4e4d50c5ea3a

          SHA256

          7a6534b45cd4ab1ac0b0db81a90047951e26e104d1d851612ed0c197540c968d

          SHA512

          46e883242bb25fec24ebe4c51fc28c222bb2b1522919788bc322064ab14cb7911d6ca354b5279098b749347a59f91f200cb9c12afa3951ef33c45c2aede06449

        • C:\Users\Admin\AppData\Local\xNXy\VERSION.dll

          Filesize

          1.2MB

          MD5

          6e7924a3cf6b6b71e6c79eac8e817055

          SHA1

          a5c3a0cbc88cfd979a76021006a87b70bbcb885e

          SHA256

          f2d5b2263ed4faec939af590bfafe0038a963aa0cec693f7bda2b17543a22417

          SHA512

          8a8bb821fffacc5c7a347a93ca802f7e8129a06632c02b9208e536e42856de7c45f095f9675770bad7f38b05520c12adf0647d54b998a4cecc420a8004c00dbf

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Rinzzkcfiw.lnk

          Filesize

          1KB

          MD5

          e76825578d4dfed1909d21034a9bd6c6

          SHA1

          9cddb0496d9a66e19d798e30629e92a872bda454

          SHA256

          203227149001bb96f2df92bab38120d6d99b0daa9e48b4b1a3e3b7517a8d04d1

          SHA512

          5a41daac9fb6470a471787c0a2d3a050e0c44efc0e429195b137973a4fb36cd53b06301e5f4a149c262aaef35cf2e69d3dbe8940e7fcc3bb72e20320b3902f04

        • \Users\Admin\AppData\Local\74Y2qN\xpsrchvw.exe

          Filesize

          4.6MB

          MD5

          492cb6a624d5dad73ee0294b5db37dd6

          SHA1

          e74806af04a5147ccabfb5b167eb95a0177c43b3

          SHA256

          ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784

          SHA512

          63bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835

        • \Users\Admin\AppData\Local\wJD4H10n\ComputerDefaults.exe

          Filesize

          36KB

          MD5

          86bd981f55341273753ac42ea200a81e

          SHA1

          14fe410efc9aeb0a905b984ac27719ff0dd10ea7

          SHA256

          40b194be2bad2d3d4d1b69f9aec2853c8b663130810a11607ff72a9e3a06d5b3

          SHA512

          49bb6d4bf7a9356fadde7f6165af6973630827d28b69db10ad477a84d98b08fb82e4daae777166e1ddddb5b5efcdf634e4e9bd34b255dae87462ba32e8bba143

        • \Users\Admin\AppData\Local\xNXy\UI0Detect.exe

          Filesize

          40KB

          MD5

          3cbdec8d06b9968aba702eba076364a1

          SHA1

          6e0fcaccadbdb5e3293aa3523ec1006d92191c58

          SHA256

          b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b

          SHA512

          a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d

        • memory/1344-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-29-0x0000000077510000-0x0000000077512000-memory.dmp

          Filesize

          8KB

        • memory/1344-4-0x0000000077276000-0x0000000077277000-memory.dmp

          Filesize

          4KB

        • memory/1344-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-5-0x0000000002600000-0x0000000002601000-memory.dmp

          Filesize

          4KB

        • memory/1344-35-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-34-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-42-0x0000000077276000-0x0000000077277000-memory.dmp

          Filesize

          4KB

        • memory/1344-28-0x0000000077381000-0x0000000077382000-memory.dmp

          Filesize

          4KB

        • memory/1344-25-0x0000000002220000-0x0000000002227000-memory.dmp

          Filesize

          28KB

        • memory/1344-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1344-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1700-95-0x000007FEF7630000-0x000007FEF7761000-memory.dmp

          Filesize

          1.2MB

        • memory/2388-30-0x000007FEF7640000-0x000007FEF7770000-memory.dmp

          Filesize

          1.2MB

        • memory/2388-0-0x00000000002A0000-0x00000000002A7000-memory.dmp

          Filesize

          28KB

        • memory/2388-1-0x000007FEF7640000-0x000007FEF7770000-memory.dmp

          Filesize

          1.2MB

        • memory/2508-73-0x000007FEF7630000-0x000007FEF7761000-memory.dmp

          Filesize

          1.2MB

        • memory/2508-72-0x0000000000370000-0x0000000000377000-memory.dmp

          Filesize

          28KB

        • memory/2508-78-0x000007FEF7630000-0x000007FEF7761000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-56-0x000007FEF75C0000-0x000007FEF76F2000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-51-0x000007FEF75C0000-0x000007FEF76F2000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-50-0x00000000000F0000-0x00000000000F7000-memory.dmp

          Filesize

          28KB