Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 22:47

General

  • Target

    c3f2ded942c2442b77fd47ce652bb792_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    c3f2ded942c2442b77fd47ce652bb792

  • SHA1

    b411d07b595927f4ff541b513faca778a85d38f3

  • SHA256

    2483394b81137cb8a95584ee70556b2624b4ec757cea17624f2b17b8c975e3c6

  • SHA512

    0926a6344d42a0f09262a7ce2e1b99f7009f8ab01b897dfde65a7e2df7e0ab192fd6f6d7b353303c10114e83d5d3d926cbd5c94e4f3ddf05b1a16231b3819977

  • SSDEEP

    24576:iuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:q9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c3f2ded942c2442b77fd47ce652bb792_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:4516
  • C:\Windows\system32\wbengine.exe
    C:\Windows\system32\wbengine.exe
    1⤵
      PID:3508
    • C:\Users\Admin\AppData\Local\KmAZN\wbengine.exe
      C:\Users\Admin\AppData\Local\KmAZN\wbengine.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3292
    • C:\Windows\system32\sethc.exe
      C:\Windows\system32\sethc.exe
      1⤵
        PID:3596
      • C:\Users\Admin\AppData\Local\M6KH\sethc.exe
        C:\Users\Admin\AppData\Local\M6KH\sethc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:536
      • C:\Windows\system32\SystemPropertiesRemote.exe
        C:\Windows\system32\SystemPropertiesRemote.exe
        1⤵
          PID:2088
        • C:\Users\Admin\AppData\Local\Ody\SystemPropertiesRemote.exe
          C:\Users\Admin\AppData\Local\Ody\SystemPropertiesRemote.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:4088

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\KmAZN\wbengine.exe

          Filesize

          1.5MB

          MD5

          17270a354a66590953c4aac1cf54e507

          SHA1

          715babcc8e46b02ac498f4f06df7937904d9798d

          SHA256

          9954394b43783061f9290706320cc65597c29176d5b8e7a26fa1d6b3536832b4

          SHA512

          6be0ba6be84d01ab47f5a4ca98a6b940c43bd2d1e1a273d41c3e88aca47da11d932024b007716d1a6ffe6cee396b0e3e6971ab2afc293e72472f2e61c17b2a89

        • C:\Users\Admin\AppData\Local\KmAZN\wer.dll

          Filesize

          1.2MB

          MD5

          0579b9115b48c96d3f64e54098559986

          SHA1

          94bf256f1006f893ee434100dcffefef08e1ffc9

          SHA256

          9bd12cb81b959ca6e5f6aeabc7e8b0c05f6879e5a34552b15677046513dffa32

          SHA512

          3c700ae4ecd4822e49230a528ee116d3567c0cd4e5c09dbc9d150168b8490ac34dd2e809ab612dde41dcb131e31e4bef1c519e1d42ac2517797ecd9d3d50b916

        • C:\Users\Admin\AppData\Local\M6KH\DUI70.dll

          Filesize

          1.4MB

          MD5

          cd95c3cdf742b3851bff75a553d8b419

          SHA1

          54e56f6c91aa1b65034d3657806daf1427b854ff

          SHA256

          89dbb10c048c1fe7e15eeb6dae70a00ff72b396b9a00c810d3488af0515401a7

          SHA512

          599fec5b624e4046e082b0eb98de2515706172351d8f4ee116ae581a645a602094500d6a697402d0611a89d38198d3d5b9fc896989af4f78ced8c74f5fce09f4

        • C:\Users\Admin\AppData\Local\M6KH\sethc.exe

          Filesize

          104KB

          MD5

          8ba3a9702a3f1799431cad6a290223a6

          SHA1

          9c7dc9b6830297c8f759d1f46c8b36664e26c031

          SHA256

          615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8

          SHA512

          680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746

        • C:\Users\Admin\AppData\Local\Ody\SYSDM.CPL

          Filesize

          1.2MB

          MD5

          05998e89164c945befe57a09d29fdfb7

          SHA1

          f94093d18ae734b5bedf7fdcb8d36fae7099ccf4

          SHA256

          13a6b0b39e8ade37122d9fd6e36ccf8722d9487d71d850ac0260fd65dde27f68

          SHA512

          18d2b65109d30cb875b25117d1e6ded7391c10d24ace6dc35ee59553fdc87715aa1c6138429709cd44ee954c27c213b17e20124762f6bcd26c0210cfd9bef39b

        • C:\Users\Admin\AppData\Local\Ody\SystemPropertiesRemote.exe

          Filesize

          82KB

          MD5

          cdce1ee7f316f249a3c20cc7a0197da9

          SHA1

          dadb23af07827758005ec0235ac1573ffcea0da6

          SHA256

          7984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932

          SHA512

          f1dc529ebfed814adcf3e68041243ee02ba33b56c356a63eba5ef2cb6ede1eda192e03349f6a200d34dfab67263df79cf295be3706f4197b9008ccdc53410c26

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Sfbjsepzltomqmf.lnk

          Filesize

          1KB

          MD5

          f29dcdc2999719107aa31b95963a8470

          SHA1

          bf2ad0bd1ba9ae029bae76a2a33cedf40315c8da

          SHA256

          5d705acea7caa3fb51a37537c87b7ca918a7a7ba84c94d19c30f6c7397074732

          SHA512

          5393d65a398da9ebd2b31fb153bb18ea7c786b9f276bed7ae8500b137ebb1695fb73b0231a145c24720a5c3b158f491f631e45e247d1134903efba658e9af67a

        • memory/536-62-0x00000269BA5A0000-0x00000269BA5A7000-memory.dmp

          Filesize

          28KB

        • memory/536-63-0x00007FFE6BC50000-0x00007FFE6BDC7000-memory.dmp

          Filesize

          1.5MB

        • memory/536-68-0x00007FFE6BC50000-0x00007FFE6BDC7000-memory.dmp

          Filesize

          1.5MB

        • memory/3292-51-0x00007FFE6BC90000-0x00007FFE6BDC3000-memory.dmp

          Filesize

          1.2MB

        • memory/3292-46-0x00007FFE6BC90000-0x00007FFE6BDC3000-memory.dmp

          Filesize

          1.2MB

        • memory/3292-45-0x000002007C0A0000-0x000002007C0A7000-memory.dmp

          Filesize

          28KB

        • memory/3464-25-0x0000000002CE0000-0x0000000002CE7000-memory.dmp

          Filesize

          28KB

        • memory/3464-4-0x0000000002D00000-0x0000000002D01000-memory.dmp

          Filesize

          4KB

        • memory/3464-9-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-8-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-35-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-5-0x00007FFE8875A000-0x00007FFE8875B000-memory.dmp

          Filesize

          4KB

        • memory/3464-11-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-12-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-13-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-15-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-16-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-10-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-26-0x00007FFE89770000-0x00007FFE89780000-memory.dmp

          Filesize

          64KB

        • memory/3464-24-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-14-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3464-7-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/4088-79-0x00007FFE6BC00000-0x00007FFE6BD32000-memory.dmp

          Filesize

          1.2MB

        • memory/4088-82-0x0000021CBD9B0000-0x0000021CBD9B7000-memory.dmp

          Filesize

          28KB

        • memory/4088-85-0x00007FFE6BC00000-0x00007FFE6BD32000-memory.dmp

          Filesize

          1.2MB

        • memory/4516-0-0x00007FFE7AEB0000-0x00007FFE7AFE1000-memory.dmp

          Filesize

          1.2MB

        • memory/4516-38-0x00007FFE7AEB0000-0x00007FFE7AFE1000-memory.dmp

          Filesize

          1.2MB

        • memory/4516-3-0x0000012792E20000-0x0000012792E27000-memory.dmp

          Filesize

          28KB