Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 00:28

General

  • Target

    e157bb91f2fe1d353eb5416732647237_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    e157bb91f2fe1d353eb5416732647237

  • SHA1

    89e00be7c80f2e9a47d4d40c578163dfb13da2ed

  • SHA256

    07467eba6149f24096c0c3e26ac1cdeac1fe9757de8eef09f7083561c56e3557

  • SHA512

    58f7e5943ce2110cf4cdaa3a5d28d3c60a4d28d0b0125ccd88f3ef0579c9fde66402921c4a5f5906426ba0614a4887b83fae04b1b4edc8b48f1a5273edf6398d

  • SSDEEP

    24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NB:F9cKrUqZWLAcUZ

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e157bb91f2fe1d353eb5416732647237_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1600
  • C:\Windows\system32\OptionalFeatures.exe
    C:\Windows\system32\OptionalFeatures.exe
    1⤵
      PID:2888
    • C:\Users\Admin\AppData\Local\NRXL5usV0\OptionalFeatures.exe
      C:\Users\Admin\AppData\Local\NRXL5usV0\OptionalFeatures.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2768
    • C:\Windows\system32\mspaint.exe
      C:\Windows\system32\mspaint.exe
      1⤵
        PID:2672
      • C:\Users\Admin\AppData\Local\r4ctA9dAF\mspaint.exe
        C:\Users\Admin\AppData\Local\r4ctA9dAF\mspaint.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1732
      • C:\Windows\system32\DisplaySwitch.exe
        C:\Windows\system32\DisplaySwitch.exe
        1⤵
          PID:2696
        • C:\Users\Admin\AppData\Local\BM3E\DisplaySwitch.exe
          C:\Users\Admin\AppData\Local\BM3E\DisplaySwitch.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1160

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\BM3E\slc.dll

          Filesize

          1.2MB

          MD5

          2757af9d3d08970034d4ed32655aa204

          SHA1

          766c368219c09c1c104f0583b901884027bf3f82

          SHA256

          889c346e9a77f188d5f4b505763dce9807ea54ace06b5f8934c60de43a6de06b

          SHA512

          f163131a113203a44958891d8ab98c0ed775fc3a7c769c49fd8d8e5a3170bba3b39598b33a36d6771baf15970cbef193977d0cedca2b67cd304186de22527ee2

        • C:\Users\Admin\AppData\Local\NRXL5usV0\appwiz.cpl

          Filesize

          1.2MB

          MD5

          6cc61dfb82f8ecc8b2f6cf49c8589bac

          SHA1

          ad9d780870308b956576195b1ee4c192e765114a

          SHA256

          81b644fd9dbffac9b26987087e4abaa25e3d526931b2d6299bf95056deaffb92

          SHA512

          157cb286c1101bb61b5c248ed7fb57937b8f671ddfaf90a696bacd2b01881a908638e501ceda955ade9cca65212663050b6128facd8056efca0fb327431b8dc4

        • C:\Users\Admin\AppData\Local\r4ctA9dAF\VERSION.dll

          Filesize

          1.2MB

          MD5

          f98220d129b953c3faa692506965c403

          SHA1

          f41d427e898a8a8c2f8c97da62be42ec83b40895

          SHA256

          f544b59de6d699b82567ae5909384b9157ea280de3f835435bffd050a2650bb7

          SHA512

          8b17dddbfa3dbce6a67d84f6659bafe8ad01a47e25aaeb48d53bd0d1caff484ba234817c74238b5184d6b3aab5ee3d921a709b86666124dd580b2aa55b14d67b

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ngqpewzrrtyksiv.lnk

          Filesize

          1KB

          MD5

          536d30c2c58161d738600dc587d973f6

          SHA1

          f3671842c32ddd75521349241dcf0d7d6121ca91

          SHA256

          515a08981edca8e4dce0db4388f0ada4a24f5eb27d4f29fceb273c6ceafa85a3

          SHA512

          e09f1865e1a5a7fc1cb7a477af3b67a150ac4b56a6c79c48746736813a868efccc1afca048ea94e4b5bf61c66cfed4f75f69c25eca9fbf8736f79e4b26af6bd3

        • \Users\Admin\AppData\Local\BM3E\DisplaySwitch.exe

          Filesize

          517KB

          MD5

          b795e6138e29a37508285fc31e92bd78

          SHA1

          d0fe0c38c7c61adbb77e58d48b96cd4bf98ecd4a

          SHA256

          01a9733871baa8518092bade3fce62dcca14cdf6fc55b98218253580b38d7659

          SHA512

          8312174a77bab5fef7c4e9efff66c43d3515b02f5766ed1d3b9bd0abb3d7344a9a22cbac228132098428c122293d2b1898b3a2d75f5e4247b1dcb9aa9c7913b1

        • \Users\Admin\AppData\Local\NRXL5usV0\OptionalFeatures.exe

          Filesize

          95KB

          MD5

          eae7af6084667c8f05412ddf096167fc

          SHA1

          0dbe8aba001447030e48e8ad5466fd23481e6140

          SHA256

          01feebd3aca961f31ba4eac45347b105d1c5772627b08f5538047721b61ff9bc

          SHA512

          172a8accaa35a6c9f86713a330c5899dfeeffe3b43413a3d276fc16d45cd62ed9237aa6bff29cc60a2022fba8dcc156959723c041df4b7463436a3bdabef2a9d

        • \Users\Admin\AppData\Local\r4ctA9dAF\mspaint.exe

          Filesize

          6.4MB

          MD5

          458f4590f80563eb2a0a72709bfc2bd9

          SHA1

          3f97dc3bd1467c710c6a8d26b97bb6cf47deb4c6

          SHA256

          ff923c051ae380bf30d749ebe9cf310ccab6572d84eb81b76fb1012bcbdf557f

          SHA512

          e34500658dbe105a704fff6988b75d13aa9931adfd585b8ce1f023c61abd573d58067ee1f43e80076729ba99c9a00c17eb8cfcfac9c3d271d76bd251ccab1681

        • memory/1160-94-0x000007FEF6E00000-0x000007FEF6F31000-memory.dmp

          Filesize

          1.2MB

        • memory/1160-89-0x000007FEF6E00000-0x000007FEF6F31000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-25-0x0000000002480000-0x0000000002487000-memory.dmp

          Filesize

          28KB

        • memory/1240-26-0x0000000077CF1000-0x0000000077CF2000-memory.dmp

          Filesize

          4KB

        • memory/1240-36-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-37-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-4-0x0000000077AE6000-0x0000000077AE7000-memory.dmp

          Filesize

          4KB

        • memory/1240-6-0x00000000024A0000-0x00000000024A1000-memory.dmp

          Filesize

          4KB

        • memory/1240-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-29-0x0000000077E80000-0x0000000077E82000-memory.dmp

          Filesize

          8KB

        • memory/1600-1-0x000007FEF6E10000-0x000007FEF6F40000-memory.dmp

          Filesize

          1.2MB

        • memory/1600-45-0x000007FEF6E10000-0x000007FEF6F40000-memory.dmp

          Filesize

          1.2MB

        • memory/1600-2-0x00000000001A0000-0x00000000001A7000-memory.dmp

          Filesize

          28KB

        • memory/1732-71-0x0000000000140000-0x0000000000147000-memory.dmp

          Filesize

          28KB

        • memory/1732-72-0x000007FEF68E0000-0x000007FEF6A11000-memory.dmp

          Filesize

          1.2MB

        • memory/1732-77-0x000007FEF68E0000-0x000007FEF6A11000-memory.dmp

          Filesize

          1.2MB

        • memory/2768-59-0x000007FEF7420000-0x000007FEF7551000-memory.dmp

          Filesize

          1.2MB

        • memory/2768-54-0x000007FEF7420000-0x000007FEF7551000-memory.dmp

          Filesize

          1.2MB

        • memory/2768-53-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB