Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 21:54

General

  • Target

    c7b6baa928b733cbc9cc203c4f3a8f23_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    c7b6baa928b733cbc9cc203c4f3a8f23

  • SHA1

    19b6883c6d058bd69f8e91cc9de095b885066eec

  • SHA256

    7bc99dbbeb888112a6de767ad2977ad04ea059ea9e5fe8fce9c22e2d941659bc

  • SHA512

    a6b594235fa702d123957e0120be2d0f95c04c09454c1127df600e41c2130649e9b47ccc03d5e71855b8325dd79e95df92fed00a39d9bd4500ded6aeebc29514

  • SSDEEP

    24576:ruYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:19cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c7b6baa928b733cbc9cc203c4f3a8f23_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2460
  • C:\Windows\system32\dvdupgrd.exe
    C:\Windows\system32\dvdupgrd.exe
    1⤵
      PID:2648
    • C:\Users\Admin\AppData\Local\Ykl6r\dvdupgrd.exe
      C:\Users\Admin\AppData\Local\Ykl6r\dvdupgrd.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2796
    • C:\Windows\system32\PresentationSettings.exe
      C:\Windows\system32\PresentationSettings.exe
      1⤵
        PID:2960
      • C:\Users\Admin\AppData\Local\g4USVn\PresentationSettings.exe
        C:\Users\Admin\AppData\Local\g4USVn\PresentationSettings.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2780
      • C:\Windows\system32\VaultSysUi.exe
        C:\Windows\system32\VaultSysUi.exe
        1⤵
          PID:2616
        • C:\Users\Admin\AppData\Local\kXfCUUH\VaultSysUi.exe
          C:\Users\Admin\AppData\Local\kXfCUUH\VaultSysUi.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2728

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Ykl6r\VERSION.dll

          Filesize

          1.2MB

          MD5

          ebdd4d04339715a0628179c961a0a7d6

          SHA1

          24004f028fcdaaed5a996833194d3d366cd982cd

          SHA256

          820ff5a12baaa2a949ad8a03d80de5281aff914089ce74765308796adb9986e5

          SHA512

          8afab5444cc30568eb5996cffaa0bbfbd6345ed90b355a25548e73c59ea982ddb9ba05237d7a184c8f82ed56ca473f63b550e598d32e3c1d6990349669908871

        • C:\Users\Admin\AppData\Local\g4USVn\slc.dll

          Filesize

          1.2MB

          MD5

          3d853feaa67a8bff1a85449a7170a2f2

          SHA1

          fcf74242b2543d55710c64c1b112d657c92d7acf

          SHA256

          c6d86920122fd78fb68a6fa109958a99b5467bead3e3fd6bf77c8e34fe7a06d6

          SHA512

          016026237bb51e6bca8900ae86a602d081342740cad8d825c16f964a41cd5627d6cf410a864a5242c1bc49c2ecf5d62b198ba84c4b53ade8d0d64dcea8cd4efd

        • C:\Users\Admin\AppData\Local\kXfCUUH\credui.dll

          Filesize

          1.2MB

          MD5

          dd20826b131f003b9880a2e863fcd487

          SHA1

          86e9b6a91c32bfb7f77c7b8b1691c28680afb5d3

          SHA256

          6c88c9932ebe9fd30d659f3c1e3dbf0718208a63927e3735c62af2ff6391ce08

          SHA512

          102b164be182deae8d60dbf3e45ece18d9ffca34a8a3d354d9a97ebd0aa0d0f6696caa345ef543445a09eac708e73f82ee9d57563fd39b1bde1810a9cc8f4781

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dzyzbjcaevupvd.lnk

          Filesize

          1KB

          MD5

          94efb6058581b4d648df44f76b06a6cd

          SHA1

          0dee1838ac16a80a4500b9ce84e400fc0cb5cc8f

          SHA256

          7762b16f3d860393d83e1dfbee9972e6c7520edca650b0273b755b205d5ef0cb

          SHA512

          c3e797bfb5922408fe2c806c5fedf663f7d9e49e681f37c3bb1eaa6e72bb256d4dee296a191dd7cbd25d6c832d3e9c7268b433b5ed9eea1924bac17572c9ec2b

        • \Users\Admin\AppData\Local\Ykl6r\dvdupgrd.exe

          Filesize

          25KB

          MD5

          75a9b4172eac01d9648c6d2133af952f

          SHA1

          63c7e1af762d2b584e9cc841e8b0100f2a482b81

          SHA256

          18f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736

          SHA512

          5a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769

        • \Users\Admin\AppData\Local\g4USVn\PresentationSettings.exe

          Filesize

          172KB

          MD5

          a6f8d318f6041334889481b472000081

          SHA1

          b8cf08ec17b30c8811f2514246fcdff62731dd58

          SHA256

          208b94fd66a6ce266c3195f87029a41a0622fff47f2a5112552cb087adbb1258

          SHA512

          60f70fa8a19e6ea6f08f4907dd7fede3665ad3f2e013d49f6649442ea5871a967b9a53ec4d3328a06cb83b69be1b7af1bb14bf122b568bd1f8432ee1d0bfee69

        • \Users\Admin\AppData\Local\kXfCUUH\VaultSysUi.exe

          Filesize

          39KB

          MD5

          f40ef105d94350d36c799ee23f7fec0f

          SHA1

          ee3a5cfe8b807e1c1718a27eb97fa134360816e3

          SHA256

          eeb3f79be414b81f4eb8167390641787f14a033414533fb8de651c2247d054b2

          SHA512

          f16bcca6f6cecbdae117d5a41de7e86a6d9dfdfa2ce8c75ebff10d097083c106e7f9d030debed8cb20fdd71815a8aa7723a1d3c68b38ec382e55370331c594a1

        • memory/1196-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-4-0x0000000077A56000-0x0000000077A57000-memory.dmp

          Filesize

          4KB

        • memory/1196-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-25-0x0000000002D20000-0x0000000002D27000-memory.dmp

          Filesize

          28KB

        • memory/1196-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-29-0x0000000077CF0000-0x0000000077CF2000-memory.dmp

          Filesize

          8KB

        • memory/1196-28-0x0000000077B61000-0x0000000077B62000-memory.dmp

          Filesize

          4KB

        • memory/1196-36-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-37-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-5-0x0000000002D40000-0x0000000002D41000-memory.dmp

          Filesize

          4KB

        • memory/1196-46-0x0000000077A56000-0x0000000077A57000-memory.dmp

          Filesize

          4KB

        • memory/1196-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1196-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/2460-45-0x000007FEF6860000-0x000007FEF6990000-memory.dmp

          Filesize

          1.2MB

        • memory/2460-3-0x00000000003A0000-0x00000000003A7000-memory.dmp

          Filesize

          28KB

        • memory/2460-0-0x000007FEF6860000-0x000007FEF6990000-memory.dmp

          Filesize

          1.2MB

        • memory/2728-95-0x0000000001CA0000-0x0000000001CA7000-memory.dmp

          Filesize

          28KB

        • memory/2728-99-0x000007FEF6880000-0x000007FEF69B1000-memory.dmp

          Filesize

          1.2MB

        • memory/2780-72-0x0000000001AC0000-0x0000000001AC7000-memory.dmp

          Filesize

          28KB

        • memory/2780-73-0x000007FEF6880000-0x000007FEF69B1000-memory.dmp

          Filesize

          1.2MB

        • memory/2780-78-0x000007FEF6880000-0x000007FEF69B1000-memory.dmp

          Filesize

          1.2MB

        • memory/2796-60-0x000007FEF7060000-0x000007FEF7191000-memory.dmp

          Filesize

          1.2MB

        • memory/2796-55-0x000007FEF7060000-0x000007FEF7191000-memory.dmp

          Filesize

          1.2MB

        • memory/2796-54-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB