Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 00:05

General

  • Target

    d55614e6cbad9762cfc2da2a9a63c4e1_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    d55614e6cbad9762cfc2da2a9a63c4e1

  • SHA1

    ccac6a50e607b7d04d08909f5b7cf599bb3fb251

  • SHA256

    a6866e4ea5286aa400679b697215fcb3c11c72a67d0b5412da6a10e67086abd1

  • SHA512

    87559e43ddaa3c2568702431f8b1856533697f414d9f6916e363d747d89c48d6348ea754ae18396cad7aff581c0bc75c35cc9b4b48dab85c9a00690178699a9c

  • SSDEEP

    24576:GuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Nrt:m9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d55614e6cbad9762cfc2da2a9a63c4e1_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:396
  • C:\Windows\system32\usocoreworker.exe
    C:\Windows\system32\usocoreworker.exe
    1⤵
      PID:4936
    • C:\Users\Admin\AppData\Local\o8UOVj\usocoreworker.exe
      C:\Users\Admin\AppData\Local\o8UOVj\usocoreworker.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4072
    • C:\Windows\system32\WindowsActionDialog.exe
      C:\Windows\system32\WindowsActionDialog.exe
      1⤵
        PID:3604
      • C:\Users\Admin\AppData\Local\9oYiWtmQV\WindowsActionDialog.exe
        C:\Users\Admin\AppData\Local\9oYiWtmQV\WindowsActionDialog.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3152
      • C:\Windows\system32\MusNotificationUx.exe
        C:\Windows\system32\MusNotificationUx.exe
        1⤵
          PID:1324
        • C:\Users\Admin\AppData\Local\naAp\MusNotificationUx.exe
          C:\Users\Admin\AppData\Local\naAp\MusNotificationUx.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:4320

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\9oYiWtmQV\DUI70.dll

          Filesize

          1.4MB

          MD5

          7f881c7fe3f75b5deccb3c56815a68dc

          SHA1

          7f2b3acd32f47ba4d3d1b756b8be6da723c8e434

          SHA256

          18803fd09c89567e051cfb74753bd69e14fe54eeded62290924f5eb3e89cc681

          SHA512

          fe365736236cf42ff2fd4afa39eb93c5816fe5515fe3678d2d2c056967f5ef9e2488dcecb28b14366b12543e1670dca879ac914b7300b61bb86fe3299610903a

        • C:\Users\Admin\AppData\Local\9oYiWtmQV\WindowsActionDialog.exe

          Filesize

          61KB

          MD5

          73c523b6556f2dc7eefc662338d66f8d

          SHA1

          1e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5

          SHA256

          0c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31

          SHA512

          69d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912

        • C:\Users\Admin\AppData\Local\naAp\MusNotificationUx.exe

          Filesize

          615KB

          MD5

          869a214114a81712199f3de5d69d9aad

          SHA1

          be973e4188eff0d53fdf0e9360106e8ad946d89f

          SHA256

          405c2df9a36d7cfb5c8382c96f04792eb88c11a6cfa36b1d2ec3e0bec8d17361

          SHA512

          befcdeb8de6e68b9ee0bacd4cbc80f7393a0213d4039b239c98585e0cd5db1755c75559a62372374cbfb7132b6a7973ea9e6a31952e0e0ba007079c56e6d9012

        • C:\Users\Admin\AppData\Local\naAp\XmlLite.dll

          Filesize

          1.2MB

          MD5

          5e67a4d146ad9c07aacdfa62dab609dc

          SHA1

          c6114729cae1c9206100f2297bef953e227e3dcd

          SHA256

          a9a4c2e4bc7caebbd8dbe1580434c3b4e5a9a89f1211a7367cbcaf5a1a2d65e1

          SHA512

          b465d580837f66cc351c2ffa60f79f15c03a7539533f24efd15b2184262b205d5ffaff0c5ef235035ac6aced9ae6f22a330f6bd201c421d5e7d72549ccbda0b7

        • C:\Users\Admin\AppData\Local\o8UOVj\XmlLite.dll

          Filesize

          1.2MB

          MD5

          0f97efe04b82a45bf527af8efda06870

          SHA1

          d328f565c8fa98f331fd59d18fd498b13b9cc47e

          SHA256

          708567bc6ca4d0dc226c2822ba0e9138f179a0c4c50e32a15b2e4c83219f70e6

          SHA512

          2c8ae28f3e6aca70384ddbcfc979337c5fe2239de452747dd81107e7c8418c8bc1381f6e91f5286cbec0c78eeed4a7e95f8707085513e0d3400d7eba21b8d57b

        • C:\Users\Admin\AppData\Local\o8UOVj\usocoreworker.exe

          Filesize

          1.3MB

          MD5

          2c5efb321aa64af37dedc6383ce3198e

          SHA1

          a06d7020dd43a57047a62bfb443091cd9de946ba

          SHA256

          0fb6688a32340036f3eaab4a09a82dee533bfb2ca266c36f6142083134de6f0e

          SHA512

          5448ea01b24af7444505bda80064849a2efcc459011d32879e021e836fd573c9b1b9d3b37291d3f53ff536c691ac13a545b12f318a16c8a367421986bbf002ed

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ahvhgxnkgdxqlh.lnk

          Filesize

          1KB

          MD5

          63acce9db18dea962876fed617a45acd

          SHA1

          325ac9f0fc1c13ffcf05a455a15cc82268f1dce3

          SHA256

          5ee36bf58f8dcfd1b7a0d5fd6786a8ebeb2eb04ef8060211e1a9d609f5987a11

          SHA512

          d6688acb7debe06e325fb9542390071d65d1f196b39c241207fa69b5c3ff62d9fe91d2e9b105e29ff6f1a6f34193af46c846587cae96e2dabc8c466b6cbfee8a

        • memory/396-0-0x00007FF8EF180000-0x00007FF8EF2B1000-memory.dmp

          Filesize

          1.2MB

        • memory/396-3-0x000002A593720000-0x000002A593727000-memory.dmp

          Filesize

          28KB

        • memory/396-39-0x00007FF8EF180000-0x00007FF8EF2B1000-memory.dmp

          Filesize

          1.2MB

        • memory/3152-69-0x00007FF8E0860000-0x00007FF8E09D7000-memory.dmp

          Filesize

          1.5MB

        • memory/3152-66-0x0000020F642A0000-0x0000020F642A7000-memory.dmp

          Filesize

          28KB

        • memory/3152-63-0x00007FF8E0860000-0x00007FF8E09D7000-memory.dmp

          Filesize

          1.5MB

        • memory/3372-9-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-15-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-17-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-11-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-8-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-7-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-12-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-14-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-16-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-4-0x0000000002340000-0x0000000002341000-memory.dmp

          Filesize

          4KB

        • memory/3372-6-0x00007FF8FCEDA000-0x00007FF8FCEDB000-memory.dmp

          Filesize

          4KB

        • memory/3372-13-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-25-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-30-0x00000000008C0000-0x00000000008C7000-memory.dmp

          Filesize

          28KB

        • memory/3372-36-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3372-31-0x00007FF8FDF10000-0x00007FF8FDF20000-memory.dmp

          Filesize

          64KB

        • memory/3372-10-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/4072-52-0x00007FF8E08A0000-0x00007FF8E09D2000-memory.dmp

          Filesize

          1.2MB

        • memory/4072-47-0x00007FF8E08A0000-0x00007FF8E09D2000-memory.dmp

          Filesize

          1.2MB

        • memory/4072-46-0x0000020B88160000-0x0000020B88167000-memory.dmp

          Filesize

          28KB

        • memory/4320-83-0x00000222FE3C0000-0x00000222FE3C7000-memory.dmp

          Filesize

          28KB

        • memory/4320-86-0x00007FF8E08A0000-0x00007FF8E09D2000-memory.dmp

          Filesize

          1.2MB