Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 21:50

General

  • Target

    e11bf282fd9be970031baf9797a1379a_JaffaCakes118.dll

  • Size

    991KB

  • MD5

    e11bf282fd9be970031baf9797a1379a

  • SHA1

    1f7d6162e6ded5db6199dfb1274c2849a0a48657

  • SHA256

    32e5d40ccc266ccfb480fce21f10220a42dcf29b437685b9355b013aa4df6e05

  • SHA512

    886a68d0ad35357c25dd0511d8a9b84eb06a46a499b7e6c28ab4a5300f0c31ae4a598456b6e49648db1b01beaaf76730536336a35f675d134af71ed1723e263b

  • SSDEEP

    24576:hVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:hV8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e11bf282fd9be970031baf9797a1379a_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2120
  • C:\Windows\system32\SoundRecorder.exe
    C:\Windows\system32\SoundRecorder.exe
    1⤵
      PID:2816
    • C:\Users\Admin\AppData\Local\JwH\SoundRecorder.exe
      C:\Users\Admin\AppData\Local\JwH\SoundRecorder.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2640
    • C:\Windows\system32\sdclt.exe
      C:\Windows\system32\sdclt.exe
      1⤵
        PID:2176
      • C:\Users\Admin\AppData\Local\ygFKKR880\sdclt.exe
        C:\Users\Admin\AppData\Local\ygFKKR880\sdclt.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1984
      • C:\Windows\system32\msdt.exe
        C:\Windows\system32\msdt.exe
        1⤵
          PID:2044
        • C:\Users\Admin\AppData\Local\0C3OB0\msdt.exe
          C:\Users\Admin\AppData\Local\0C3OB0\msdt.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1820

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\0C3OB0\UxTheme.dll

          Filesize

          993KB

          MD5

          4fe823d138ba98665f7464e01c163c26

          SHA1

          63abd5bd2f2f54fdc07a6cb8861090254361235d

          SHA256

          0ff7b0f6913afd35fa1030774a97aa598fd41e97f69a8bd56cecdb697b50e4f5

          SHA512

          40dac56d50285843f8552d8ba796a71adfbdbed35cfa0bd8f887f5c43f0d8e20dae5af2cbf874f1e1a9b7f2a9f06c68134b33c217c71d73c18df436c735aa50e

        • C:\Users\Admin\AppData\Local\JwH\WINMM.dll

          Filesize

          996KB

          MD5

          9aeda448dfdf696102461d6db46d9e31

          SHA1

          4e1e0736c21c21079af186123c3e0431019df83e

          SHA256

          36e36f564a2ae73598d9c22efc6356936b66035eb5c8d65a0e8cbdfbe74ad583

          SHA512

          96df0aa2144330c3f50a468d4b2ba631d23aa3aca6249e8f99304d160a92e8090fbc005ee4240a6b03c95da6f0a35916bc8f1b355cfe0fe80525a0ca413d25a7

        • C:\Users\Admin\AppData\Local\ygFKKR880\wer.dll

          Filesize

          994KB

          MD5

          2dcf07c5b42b49881bfedac1d59f9d04

          SHA1

          d01c3682aa747ae68d929ad94bff6abede3e3b1e

          SHA256

          ae8bd565eb7bc4424104dfe5d2da3c81855634f0580da9f38c5553fc2d8ad752

          SHA512

          70888d0dac7ba739a5b05f1b259f7243e168ac6327b03d719c474be8892259afa27321e7149a8f3ea3345f4911bb0e52899837c3b34590a88a6712589366f0e5

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ncfyujonfo.lnk

          Filesize

          1KB

          MD5

          60bc61e01fdee50ad3106cf15c0f57b7

          SHA1

          3a47063019fbf597172a3482bfc65013d24e070e

          SHA256

          8ec1d28e643a12622988c8f0a69e1f149006b09f179999fe9b304ba7181da8b1

          SHA512

          0dd8e0991458fa9b9dfcf24971bbf3af2071558b2f6cc810358824d6575d515aadb6dc3fe6d0f61606e783db4a0b86c00cd2876c88b41ee0816085f90058df6b

        • \Users\Admin\AppData\Local\0C3OB0\msdt.exe

          Filesize

          1.0MB

          MD5

          aecb7b09566b1f83f61d5a4b44ae9c7e

          SHA1

          3a4a2338c6b5ac833dc87497e04fe89c5481e289

          SHA256

          fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5

          SHA512

          6e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746

        • \Users\Admin\AppData\Local\JwH\SoundRecorder.exe

          Filesize

          139KB

          MD5

          47f0f526ad4982806c54b845b3289de1

          SHA1

          8420ea488a2e187fe1b7fcfb53040d10d5497236

          SHA256

          e81b11fe30b16fa4e3f08810513c245248adce8566355a8f2a19c63b1143ff5b

          SHA512

          4c9a1aa5ed55087538c91a77d7420932263b69e59dc57b1db738e59624265b734bf29e2b6ed8d0adb2e0dec5763bfbf86876fd7d1139c21e829001c7868d515d

        • \Users\Admin\AppData\Local\ygFKKR880\sdclt.exe

          Filesize

          1.2MB

          MD5

          cdebd55ffbda3889aa2a8ce52b9dc097

          SHA1

          4b3cbfff5e57fa0cb058e93e445e3851063646cf

          SHA256

          61bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd

          SHA512

          2af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13

        • memory/1208-24-0x00000000025B0000-0x00000000025B7000-memory.dmp

          Filesize

          28KB

        • memory/1208-12-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-10-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-9-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-8-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-36-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-35-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-29-0x0000000077060000-0x0000000077062000-memory.dmp

          Filesize

          8KB

        • memory/1208-28-0x0000000076ED1000-0x0000000076ED2000-memory.dmp

          Filesize

          4KB

        • memory/1208-4-0x0000000076CC6000-0x0000000076CC7000-memory.dmp

          Filesize

          4KB

        • memory/1208-23-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-5-0x0000000002F00000-0x0000000002F01000-memory.dmp

          Filesize

          4KB

        • memory/1208-45-0x0000000076CC6000-0x0000000076CC7000-memory.dmp

          Filesize

          4KB

        • memory/1208-11-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-13-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-7-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1208-14-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1820-89-0x00000000001A0000-0x00000000001A7000-memory.dmp

          Filesize

          28KB

        • memory/1820-95-0x0000000140000000-0x00000001400FD000-memory.dmp

          Filesize

          1012KB

        • memory/1984-71-0x0000000000530000-0x0000000000537000-memory.dmp

          Filesize

          28KB

        • memory/1984-72-0x0000000140000000-0x00000001400FD000-memory.dmp

          Filesize

          1012KB

        • memory/1984-77-0x0000000140000000-0x00000001400FD000-memory.dmp

          Filesize

          1012KB

        • memory/2120-44-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/2120-3-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB

        • memory/2120-0-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/2640-57-0x0000000140000000-0x00000001400FE000-memory.dmp

          Filesize

          1016KB

        • memory/2640-53-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/2640-54-0x0000000140000000-0x00000001400FE000-memory.dmp

          Filesize

          1016KB