Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2024 18:00

General

  • Target

    c572ea4c00bbf5b57f75082b7abc9d4a_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    c572ea4c00bbf5b57f75082b7abc9d4a

  • SHA1

    b607b459531d5d3629d83b74a3e7064ab0a5172d

  • SHA256

    532c4a9fdcc00ccbbde0658accc2d5d76862011038a28136e5c19f312e1cd7a9

  • SHA512

    8de6287aae880a643a3cd3a17315d8c739b3bf3ee31df224d7d979a7e7a8b758b7429b27ac0c2ed2752a77995d5e9c4552adcf71d0b13baca9fb5492f6059ead

  • SSDEEP

    24576:BuYfg4LhHr4NFXKJO1aUyDBvZ2+ITXmpclO9d:T9cKrU6ZWbAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c572ea4c00bbf5b57f75082b7abc9d4a_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2632
  • C:\Windows\system32\rrinstaller.exe
    C:\Windows\system32\rrinstaller.exe
    1⤵
      PID:2616
    • C:\Users\Admin\AppData\Local\pW7Lu\rrinstaller.exe
      C:\Users\Admin\AppData\Local\pW7Lu\rrinstaller.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2956
    • C:\Windows\system32\SystemPropertiesPerformance.exe
      C:\Windows\system32\SystemPropertiesPerformance.exe
      1⤵
        PID:1416
      • C:\Users\Admin\AppData\Local\Pxez8bt\SystemPropertiesPerformance.exe
        C:\Users\Admin\AppData\Local\Pxez8bt\SystemPropertiesPerformance.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1276
      • C:\Windows\system32\msinfo32.exe
        C:\Windows\system32\msinfo32.exe
        1⤵
          PID:2040
        • C:\Users\Admin\AppData\Local\fk9TXgT\msinfo32.exe
          C:\Users\Admin\AppData\Local\fk9TXgT\msinfo32.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1508

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Pxez8bt\SYSDM.CPL

          Filesize

          1.2MB

          MD5

          e280ab4cf806a30752eaa0194a6b42e8

          SHA1

          aea7ad25d66af3881b43f1b9abc134448dadaf82

          SHA256

          81f40d8b42b1bfb0d3feeef13585c56224c7f0556c01d12c8f4461837fb41e78

          SHA512

          7d7c708ffa8dc8fda940dc90e58bb334413f68ed088b5c1eb334fdcbdbb95d5f010d981d1b52bc47403000204cde72906a47c71700bae569d988903ddfef19b6

        • C:\Users\Admin\AppData\Local\fk9TXgT\MFC42u.dll

          Filesize

          1.2MB

          MD5

          a4d5201ed7bf8144e5b1abd08ec5c8fd

          SHA1

          583b973ee979defd66b30c1a24c1efac8bf36446

          SHA256

          a573fbe1ca995a7a32ca4a69c9bf8f619e05f649d7e19a2f1b92458612aad5ec

          SHA512

          64c143907871c50c3fd4ebdb67ecc655196441efa21cd057db875fd65ad9fc0eb0c43d37c2ca4ebaf45241c079d9439671a677a8792399d97ef886d6a4407da0

        • C:\Users\Admin\AppData\Local\fk9TXgT\msinfo32.exe

          Filesize

          370KB

          MD5

          d291620d4c51c5f5ffa62ccdc52c5c13

          SHA1

          2081c97f15b1c2a2eadce366baf3c510da553cc7

          SHA256

          76e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae

          SHA512

          75f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b

        • C:\Users\Admin\AppData\Local\pW7Lu\MFPlat.DLL

          Filesize

          1.2MB

          MD5

          d4e796577fb3855b38f2eb9666ad4db9

          SHA1

          2b0cc4c84c18161d5a080b8e7ca21b39f9a56610

          SHA256

          be93d6490d859450f0b9819d23796b12f4bc905158a145bac7ec898531c38b8a

          SHA512

          247b1298d9639d4da3a411c119f9875854832d7b89a44041813a2fc209bf8f6b13f362d7e773f6abda46595069eed62276cd20c80e7d17d413aeca38e09b4aa5

        • C:\Users\Admin\AppData\Local\pW7Lu\rrinstaller.exe

          Filesize

          54KB

          MD5

          0d3a73b0b30252680b383532f1758649

          SHA1

          9f098d2037e4dd94eca6d04c37b3d4ad8b0cc931

          SHA256

          fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc

          SHA512

          a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ppapbotpack.lnk

          Filesize

          1012B

          MD5

          5bb488c04101ae19c65301778f523343

          SHA1

          75097b2fad844a1252a897a1f473b2a93535bd67

          SHA256

          4fbe676c3ab5ff7a9e492adcd5818eb6a0c3ac03476fc018d703e2385d0f0d27

          SHA512

          13d0c1e5f32a292481e2200472ae1aedecbe12a1f4d74f5ca6a02eee663928de50f47af687c48e0f402f2898a82c30867d99b6e5a5e02b78e5004f0c24e57417

        • \Users\Admin\AppData\Local\Pxez8bt\SystemPropertiesPerformance.exe

          Filesize

          80KB

          MD5

          870726cdcc241a92785572628b89cc07

          SHA1

          63d47cc4fe9beb75862add1abca1d8ae8235710a

          SHA256

          1ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6

          SHA512

          89b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72

        • memory/1236-30-0x0000000077021000-0x0000000077022000-memory.dmp

          Filesize

          4KB

        • memory/1236-47-0x0000000076E16000-0x0000000076E17000-memory.dmp

          Filesize

          4KB

        • memory/1236-8-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-7-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-14-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-26-0x0000000002840000-0x0000000002847000-memory.dmp

          Filesize

          28KB

        • memory/1236-25-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-17-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-16-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-15-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-31-0x00000000771B0000-0x00000000771B2000-memory.dmp

          Filesize

          8KB

        • memory/1236-4-0x0000000076E16000-0x0000000076E17000-memory.dmp

          Filesize

          4KB

        • memory/1236-37-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-39-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-5-0x0000000002860000-0x0000000002861000-memory.dmp

          Filesize

          4KB

        • memory/1236-9-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-10-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-11-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-13-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1236-12-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/1276-74-0x000007FEF76A0000-0x000007FEF77D2000-memory.dmp

          Filesize

          1.2MB

        • memory/1276-73-0x0000000000390000-0x0000000000397000-memory.dmp

          Filesize

          28KB

        • memory/1276-79-0x000007FEF76A0000-0x000007FEF77D2000-memory.dmp

          Filesize

          1.2MB

        • memory/1508-94-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/1508-91-0x000007FEF76A0000-0x000007FEF77D8000-memory.dmp

          Filesize

          1.2MB

        • memory/1508-97-0x000007FEF76A0000-0x000007FEF77D8000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-46-0x000007FEF7690000-0x000007FEF77C1000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-1-0x000007FEF7690000-0x000007FEF77C1000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-0-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB

        • memory/2956-61-0x000007FEF77D0000-0x000007FEF7903000-memory.dmp

          Filesize

          1.2MB

        • memory/2956-58-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/2956-55-0x000007FEF77D0000-0x000007FEF7903000-memory.dmp

          Filesize

          1.2MB