Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 16:04

General

  • Target

    bc6a7f50f96beb004bcf9c6174e93bbd_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    bc6a7f50f96beb004bcf9c6174e93bbd

  • SHA1

    938e569330ff878fcbd597dc60106be24764991b

  • SHA256

    5ed7ff55cc5fd11a4ac5a823ff7cebb7e252e0a8d37dc1a1715d4098af9aeedc

  • SHA512

    b8c02c3651cb233c51420bf357c41fd243582b75fa8223d92fbeeebeb3117bdbd507a93e9349f94c33502dd5f531a4281c6cbceff3bf5fcdc15894fbe23ca8b1

  • SSDEEP

    24576:ouYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:Y9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc6a7f50f96beb004bcf9c6174e93bbd_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1376
  • C:\Windows\system32\FXSCOVER.exe
    C:\Windows\system32\FXSCOVER.exe
    1⤵
      PID:1176
    • C:\Users\Admin\AppData\Local\1eZZG3D\FXSCOVER.exe
      C:\Users\Admin\AppData\Local\1eZZG3D\FXSCOVER.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4044
    • C:\Windows\system32\CameraSettingsUIHost.exe
      C:\Windows\system32\CameraSettingsUIHost.exe
      1⤵
        PID:4328
      • C:\Users\Admin\AppData\Local\yu0PwcRNk\CameraSettingsUIHost.exe
        C:\Users\Admin\AppData\Local\yu0PwcRNk\CameraSettingsUIHost.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:976
      • C:\Windows\system32\wextract.exe
        C:\Windows\system32\wextract.exe
        1⤵
          PID:4204
        • C:\Users\Admin\AppData\Local\fwFrd6LfE\wextract.exe
          C:\Users\Admin\AppData\Local\fwFrd6LfE\wextract.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:4556

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\1eZZG3D\FXSCOVER.exe

          Filesize

          242KB

          MD5

          5769f78d00f22f76a4193dc720d0b2bd

          SHA1

          d62b6cab057e88737cba43fe9b0c6d11a28b53e8

          SHA256

          40e8e6dabfa1485b11cdccf220eb86eeaa8256e99e344cf2b2098d4cdb788a31

          SHA512

          b4b3448a2635b21690c71254d964832e89bf947f7a0d32e79dcc84730f11d4afb4149a810a768878e52f88fc8baec45f1a2fec8e22c5301e9f39fe4fc6a57e3f

        • C:\Users\Admin\AppData\Local\1eZZG3D\MFC42u.dll

          Filesize

          1.2MB

          MD5

          febf113fb88c26da98ec27caea7f2e40

          SHA1

          763178bf0f1ca6a89a48e92f9e03fa610009ce40

          SHA256

          a10c4b726d899c2e695704318de8a3896e5e4b968c75e991ff07ef60eacfb6d7

          SHA512

          4a5e8df94d62372a1a6aedc6e9e39cba335db2053c0f723f8272d7d5bfbee741af2ba389eb4cb75ac3bdeed59e15f30d1178057a400a5a06bda0eb5c76ba4a49

        • C:\Users\Admin\AppData\Local\fwFrd6LfE\VERSION.dll

          Filesize

          1.2MB

          MD5

          4f7ff358f7ca36ae0fa19fd313f9a09b

          SHA1

          87fb7eb16377a777064dc6e425409bfc37eac046

          SHA256

          f4e21aee2258204404f2c6ffc3f8823a999df85c1038d71bac1d022710aad827

          SHA512

          50f28d43e51b1dc8fc1b04d602310b37a362cb14697eaa8b263805dedbb64cdf8aa22f9515aff50ff029f44910d71b72e783f8566faa9e131abdf7482df81bca

        • C:\Users\Admin\AppData\Local\fwFrd6LfE\wextract.exe

          Filesize

          143KB

          MD5

          56e501e3e49cfde55eb1caabe6913e45

          SHA1

          ab2399cbf17dbee7b302bea49e40d4cee7caea76

          SHA256

          fbb6dc62abeeb222b49a63f43dc6eea96f3d7e9a8da55381c15d57a5d099f3e0

          SHA512

          2b536e86cbd8ab026529ba2c72c0fda97e9b6f0bc4fd96777024155852670cb41d17937cde372a44cdbad3e53b8cd3ef1a4a3ee9b34dfb3c2069822095f7a172

        • C:\Users\Admin\AppData\Local\yu0PwcRNk\CameraSettingsUIHost.exe

          Filesize

          31KB

          MD5

          9e98636523a653c7a648f37be229cf69

          SHA1

          bd4da030e7cf4d55b7c644dfacd26b152e6a14c4

          SHA256

          3bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717

          SHA512

          41966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78

        • C:\Users\Admin\AppData\Local\yu0PwcRNk\DUI70.dll

          Filesize

          1.4MB

          MD5

          cece3428f0d087437a20fc45649f62e5

          SHA1

          a35b3a55c51a1dae6054f22f9dacc00318580aaa

          SHA256

          01831eadaa157e44d3a84f6f50826980066530c5ee5c8853544af7a59c80200f

          SHA512

          e249c4d545601d00ab7907cd73e9fe154b296e51aea41e03e7e2b0c47d744b90cf9db12ee6601faf075350478e7f11fdd9e4574c6110c66f1127641c7768c69b

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Sfbjsepzltomqmf.lnk

          Filesize

          1KB

          MD5

          6c1022f4ad92046682012a748ddd7cc0

          SHA1

          214e28ba73553280ae147ea176ccdc77774e77ef

          SHA256

          6ac6a07baec2b35c3a3e4a6f596c1199925702acc77905c765669faef981c9f6

          SHA512

          e89c98d07dcc5600adbdc80f56bf4a82004638dbeb0c1c7a429d37932e116ab3b6dd65edcd0e30b8af33b97614ce0d8fcf0c91a66ddeebceecaf4a1e6f29f7a5

        • memory/976-63-0x00007FFB48360000-0x00007FFB484D7000-memory.dmp

          Filesize

          1.5MB

        • memory/976-66-0x000001D49D190000-0x000001D49D197000-memory.dmp

          Filesize

          28KB

        • memory/976-69-0x00007FFB48360000-0x00007FFB484D7000-memory.dmp

          Filesize

          1.5MB

        • memory/1376-0-0x00007FFB57810000-0x00007FFB57941000-memory.dmp

          Filesize

          1.2MB

        • memory/1376-39-0x00007FFB57810000-0x00007FFB57941000-memory.dmp

          Filesize

          1.2MB

        • memory/1376-3-0x000001E7F3B80000-0x000001E7F3B87000-memory.dmp

          Filesize

          28KB

        • memory/3484-28-0x0000000001160000-0x0000000001167000-memory.dmp

          Filesize

          28KB

        • memory/3484-14-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-11-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-10-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-9-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-8-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-13-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-15-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-16-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-6-0x00007FFB65BEA000-0x00007FFB65BEB000-memory.dmp

          Filesize

          4KB

        • memory/3484-4-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3484-7-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-17-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-29-0x00007FFB65D30000-0x00007FFB65D40000-memory.dmp

          Filesize

          64KB

        • memory/3484-36-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-25-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3484-12-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/4044-52-0x00007FFB483A0000-0x00007FFB484D8000-memory.dmp

          Filesize

          1.2MB

        • memory/4044-47-0x00007FFB483A0000-0x00007FFB484D8000-memory.dmp

          Filesize

          1.2MB

        • memory/4044-46-0x000002F3F0590000-0x000002F3F0597000-memory.dmp

          Filesize

          28KB

        • memory/4556-80-0x00007FFB483A0000-0x00007FFB484D2000-memory.dmp

          Filesize

          1.2MB

        • memory/4556-83-0x000001B9E1A60000-0x000001B9E1A67000-memory.dmp

          Filesize

          28KB

        • memory/4556-86-0x00007FFB483A0000-0x00007FFB484D2000-memory.dmp

          Filesize

          1.2MB