Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 10:28

General

  • Target

    e69e1a73d6e6fb771bfe4de8e067f946_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    e69e1a73d6e6fb771bfe4de8e067f946

  • SHA1

    019a67e5cf84aab2e0e3f97e82c85e123e8541fe

  • SHA256

    cbe5154f2de0b6dff70341409f7f0a41e9c77853528736752887fa88187b828d

  • SHA512

    dab0fe1150f8e28dc1e2eece414fe0eb2a20b627164d460e80c0d01daa0c560824eaf371f50f00c94ea0e474e2de860eec3987fceba720c4237ea491e8c426f6

  • SSDEEP

    24576:3VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL80t:3V8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e69e1a73d6e6fb771bfe4de8e067f946_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2904
  • C:\Windows\system32\wextract.exe
    C:\Windows\system32\wextract.exe
    1⤵
      PID:2052
    • C:\Users\Admin\AppData\Local\AgYFzHF\wextract.exe
      C:\Users\Admin\AppData\Local\AgYFzHF\wextract.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2708
    • C:\Windows\system32\wscript.exe
      C:\Windows\system32\wscript.exe
      1⤵
        PID:2624
      • C:\Users\Admin\AppData\Local\rpw\wscript.exe
        C:\Users\Admin\AppData\Local\rpw\wscript.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2668
      • C:\Windows\system32\wbengine.exe
        C:\Windows\system32\wbengine.exe
        1⤵
          PID:932
        • C:\Users\Admin\AppData\Local\UEIklu7\wbengine.exe
          C:\Users\Admin\AppData\Local\UEIklu7\wbengine.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2240

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\AgYFzHF\VERSION.dll

          Filesize

          1.2MB

          MD5

          74ac9fbac85ea4288f844b756bd94785

          SHA1

          f593673fcb8a094bfabf13558b4c0bf265f4d309

          SHA256

          5c003e25f8f99f2a607c77401864c5ba280b6a2f63a8d1ce43ac782fb4350809

          SHA512

          6c7e87f6508d4be45ac2161118166f79d0797d6ba64a283c5980242b77587636fcc5c1bab18e8a41c4764339a021a7f3fc235f7a435774e40d780530286f73a6

        • C:\Users\Admin\AppData\Local\UEIklu7\XmlLite.dll

          Filesize

          1.2MB

          MD5

          6a9aeb309a9d4ed8193c00e3d6021f75

          SHA1

          1a61c468cfebef1e4b14f45f752f8d118831195a

          SHA256

          d50030331568008ba245ce8d3aa233c98e0bf014dc30a5d80d85803d8eb65a01

          SHA512

          8111a0855ed05e032b6fdc16f8374d1ee9b544c933e2c607d50ea40f6823e42b4898fc517d582aa52ac7b968fe6a6a6dfdbaf74fe35801ec411449ed6de87487

        • C:\Users\Admin\AppData\Local\rpw\VERSION.dll

          Filesize

          1.2MB

          MD5

          271f8c441a1fa09fcd4a9ce254557d32

          SHA1

          ba5515dafaf771ca456285fc870e8b63680e07d5

          SHA256

          86fff1d97b87ffb892583d7261069e9d5ed22738712c8c055ee3524aa9e75d75

          SHA512

          84d56bffc25f52a623b142b5ec708331f7bc3ed5643d81c940176d52cc2c70788c9b364d1eae71ea2fd90f3a1313db29145fa7a4ba47374049160651838b6a1a

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Frhyegfvspmw.lnk

          Filesize

          1KB

          MD5

          d5f05933982c17c1d26764cd96428ba9

          SHA1

          7a2291dd6ce51b06a515377c007851d4d9094626

          SHA256

          7e0aecba2fbc098a224f4d55bef671c71e84cdd079392df3009b9034b5e9b8c7

          SHA512

          16ab197697fd1c7995a2e711760305d1ae65d39a90479de6f09a2af557cba53ae2ee174e14081b94f0eb49890c79a1c58c658dd726d062cf0a20c2c8496b4cb7

        • \Users\Admin\AppData\Local\AgYFzHF\wextract.exe

          Filesize

          140KB

          MD5

          1ea6500c25a80e8bdb65099c509af993

          SHA1

          6a090ef561feb4ae1c6794de5b19c5e893c4aafc

          SHA256

          99123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2

          SHA512

          b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb

        • \Users\Admin\AppData\Local\UEIklu7\wbengine.exe

          Filesize

          1.4MB

          MD5

          78f4e7f5c56cb9716238eb57da4b6a75

          SHA1

          98b0b9db6ec5961dbb274eff433a8bc21f7e557b

          SHA256

          46a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af

          SHA512

          1a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2

        • \Users\Admin\AppData\Local\rpw\wscript.exe

          Filesize

          165KB

          MD5

          8886e0697b0a93c521f99099ef643450

          SHA1

          851bd390bf559e702b8323062dbeb251d9f2f6f7

          SHA256

          d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f

          SHA512

          fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837

        • memory/1256-13-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-10-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-4-0x0000000077756000-0x0000000077757000-memory.dmp

          Filesize

          4KB

        • memory/1256-12-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-15-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-30-0x0000000077AF0000-0x0000000077AF2000-memory.dmp

          Filesize

          8KB

        • memory/1256-29-0x0000000077961000-0x0000000077962000-memory.dmp

          Filesize

          4KB

        • memory/1256-26-0x0000000002490000-0x0000000002497000-memory.dmp

          Filesize

          28KB

        • memory/1256-25-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-16-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-14-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-39-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-37-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-5-0x00000000024B0000-0x00000000024B1000-memory.dmp

          Filesize

          4KB

        • memory/1256-47-0x0000000077756000-0x0000000077757000-memory.dmp

          Filesize

          4KB

        • memory/1256-11-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-8-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-7-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/1256-9-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/2240-94-0x0000000000520000-0x0000000000527000-memory.dmp

          Filesize

          28KB

        • memory/2240-100-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/2668-76-0x0000000000200000-0x0000000000207000-memory.dmp

          Filesize

          28KB

        • memory/2668-82-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/2708-61-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/2708-56-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/2708-55-0x0000000000290000-0x0000000000297000-memory.dmp

          Filesize

          28KB

        • memory/2904-46-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/2904-0-0x00000000001A0000-0x00000000001A7000-memory.dmp

          Filesize

          28KB

        • memory/2904-1-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB