Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 01:29

General

  • Target

    e8117100d5ebd3aa4580e80bf9d2dabf_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    e8117100d5ebd3aa4580e80bf9d2dabf

  • SHA1

    fce6f07ee2719f8aeed4605302aa59a4a83733d0

  • SHA256

    66b88b6a6bbc1178cd69d4730d4e946ac78fd7b7941a7752c269e5526475a48f

  • SHA512

    5d088bc52d77f63e74ca665c234c8e6180f8dde3087a3df95c5ec551e89eb32c11618b4fa6ae538bbd16b2d7942293544b769ec3de06748a359633f74aff4c66

  • SSDEEP

    24576:tuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:n9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e8117100d5ebd3aa4580e80bf9d2dabf_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1220
  • C:\Windows\system32\SystemPropertiesComputerName.exe
    C:\Windows\system32\SystemPropertiesComputerName.exe
    1⤵
      PID:4240
    • C:\Users\Admin\AppData\Local\LkE6E\SystemPropertiesComputerName.exe
      C:\Users\Admin\AppData\Local\LkE6E\SystemPropertiesComputerName.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4932
    • C:\Windows\system32\wextract.exe
      C:\Windows\system32\wextract.exe
      1⤵
        PID:3184
      • C:\Users\Admin\AppData\Local\d8aVi\wextract.exe
        C:\Users\Admin\AppData\Local\d8aVi\wextract.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2524
      • C:\Windows\system32\dpapimig.exe
        C:\Windows\system32\dpapimig.exe
        1⤵
          PID:3696
        • C:\Users\Admin\AppData\Local\yZC\dpapimig.exe
          C:\Users\Admin\AppData\Local\yZC\dpapimig.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1064

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\LkE6E\SYSDM.CPL

          Filesize

          1.2MB

          MD5

          e2d3b5683f634fbcee9791b5fc5ab8c4

          SHA1

          a5a2bc6d862f69521238789f0681af5e7f1f78a4

          SHA256

          f95ab39d7ca2f8ef4d5474915d6168263053148cc22f00ed9b1d554103d8483e

          SHA512

          85dd1a63ef03b887e1090de86ce0c7747f67f04fe20768ae37c7572d5a3b17134765432773ebdcb6158baeacbb0202c8630bf8c38ebc0584337c5ddcf0ff7d1b

        • C:\Users\Admin\AppData\Local\LkE6E\SystemPropertiesComputerName.exe

          Filesize

          82KB

          MD5

          6711765f323289f5008a6a2a04b6f264

          SHA1

          d8116fdf73608b4b254ad83c74f2232584d24144

          SHA256

          bd3a97327326e2245938ec6099f20059b446ff0fe1c10b9317d15d1a1dd5331e

          SHA512

          438abd282d9d1c0e7e5db2ce027ff9522c3980278b32b2eae09c595884a8dcbfd5178bc5926b1d15f03174303382e13f5d5ecab9a5d8e31fc07ef39e66c012e8

        • C:\Users\Admin\AppData\Local\d8aVi\VERSION.dll

          Filesize

          1.2MB

          MD5

          2e9c0de8052da7f9afe827cffd75a89a

          SHA1

          e5dcfaac0b2f840859df0783600e1915cdd69a47

          SHA256

          a401509ac40805bcc57d25aaf86e192dee93e179d51d9fb949380dca7407c197

          SHA512

          e32f57dd808d987a7e4804ecfe30f0840fa4dc184b82e7c90f0ac00adfcc4829572bf0cb638691478e06592297c563d808ed4150388104e47585dca675362aa3

        • C:\Users\Admin\AppData\Local\d8aVi\wextract.exe

          Filesize

          143KB

          MD5

          56e501e3e49cfde55eb1caabe6913e45

          SHA1

          ab2399cbf17dbee7b302bea49e40d4cee7caea76

          SHA256

          fbb6dc62abeeb222b49a63f43dc6eea96f3d7e9a8da55381c15d57a5d099f3e0

          SHA512

          2b536e86cbd8ab026529ba2c72c0fda97e9b6f0bc4fd96777024155852670cb41d17937cde372a44cdbad3e53b8cd3ef1a4a3ee9b34dfb3c2069822095f7a172

        • C:\Users\Admin\AppData\Local\yZC\DUI70.dll

          Filesize

          1.4MB

          MD5

          8166897238181cddcdab0784bb9fd757

          SHA1

          742289d7c7192a354a673e2b796e8cd691b43419

          SHA256

          a6429a47fc54843a78d63aa62f27847d3adf0ebf36e7f491563559a0e48223f2

          SHA512

          b626b2825e22105b731f362309e9cf4246c3d3f2c159fbc6e0f07911708c6e58345265a26385a2350d329a60460ff101f263735477a2379f008ede3a8be203e0

        • C:\Users\Admin\AppData\Local\yZC\dpapimig.exe

          Filesize

          76KB

          MD5

          b6d6477a0c90a81624c6a8548026b4d0

          SHA1

          e6eac6941d27f76bbd306c2938c0a962dbf1ced1

          SHA256

          a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb

          SHA512

          72ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Nqkmrrwxgzxnra.lnk

          Filesize

          1KB

          MD5

          3c9a2505a513966bb75931e206739141

          SHA1

          bb40d68e7e624259e041c6fa424572d2fb791410

          SHA256

          83f13e6ba139b3bee1704ae352527f33b37bc1b8e9b5c397c359d2b38ec3a863

          SHA512

          45755a1862d9e9a9cdfe68316faa26fb19542d7aa191b18ea4d76de7358af19b8294ca1c53a285df08669dfde8e6f58920c085977b442f25cc89aeffc998c65a

        • memory/1064-85-0x00007FFFD07C0000-0x00007FFFD0936000-memory.dmp

          Filesize

          1.5MB

        • memory/1064-79-0x00007FFFD07C0000-0x00007FFFD0936000-memory.dmp

          Filesize

          1.5MB

        • memory/1064-82-0x0000015493E60000-0x0000015493E67000-memory.dmp

          Filesize

          28KB

        • memory/1220-1-0x00007FFFD0BE0000-0x00007FFFD0D10000-memory.dmp

          Filesize

          1.2MB

        • memory/1220-38-0x00007FFFD0BE0000-0x00007FFFD0D10000-memory.dmp

          Filesize

          1.2MB

        • memory/1220-3-0x000001EC04790000-0x000001EC04797000-memory.dmp

          Filesize

          28KB

        • memory/2524-62-0x00007FFFD0740000-0x00007FFFD0871000-memory.dmp

          Filesize

          1.2MB

        • memory/2524-65-0x000001ED30760000-0x000001ED30767000-memory.dmp

          Filesize

          28KB

        • memory/2524-68-0x00007FFFD0740000-0x00007FFFD0871000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-35-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-4-0x00000000010D0000-0x00000000010D1000-memory.dmp

          Filesize

          4KB

        • memory/3480-5-0x00007FFFDE21A000-0x00007FFFDE21B000-memory.dmp

          Filesize

          4KB

        • memory/3480-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-25-0x0000000001080000-0x0000000001087000-memory.dmp

          Filesize

          28KB

        • memory/3480-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3480-26-0x00007FFFDF2F0000-0x00007FFFDF300000-memory.dmp

          Filesize

          64KB

        • memory/3480-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/4932-45-0x00007FFFD0910000-0x00007FFFD0A41000-memory.dmp

          Filesize

          1.2MB

        • memory/4932-49-0x00007FFFD0910000-0x00007FFFD0A41000-memory.dmp

          Filesize

          1.2MB

        • memory/4932-48-0x000001EDB0540000-0x000001EDB0547000-memory.dmp

          Filesize

          28KB