Analysis

  • max time kernel
    148s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 17:01

General

  • Target

    ebcb62508d4e535105b49f6b45d8ded7_JaffaCakes118.dll

  • Size

    987KB

  • MD5

    ebcb62508d4e535105b49f6b45d8ded7

  • SHA1

    9f38415ba19244d0464092f9b6a0c0d8e87072c3

  • SHA256

    e8419cca0b781e6ed1d9fa6ec25ca11ca48c7e69665891729fd86ad5025811c6

  • SHA512

    37cd1a593852b6d7a75f86f32bde60d4976f4bc87a0d5a89061004050a19279c6bfffb925195ac7a9ad2b31fffa8eb1b3110a1e5614bf90c04732e592e19e31a

  • SSDEEP

    24576:kVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:kV8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ebcb62508d4e535105b49f6b45d8ded7_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2716
  • C:\Windows\system32\spinstall.exe
    C:\Windows\system32\spinstall.exe
    1⤵
      PID:3020
    • C:\Users\Admin\AppData\Local\88XD\spinstall.exe
      C:\Users\Admin\AppData\Local\88XD\spinstall.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2568
    • C:\Windows\system32\osk.exe
      C:\Windows\system32\osk.exe
      1⤵
        PID:1956
      • C:\Users\Admin\AppData\Local\9UUO\osk.exe
        C:\Users\Admin\AppData\Local\9UUO\osk.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2396
      • C:\Windows\system32\rrinstaller.exe
        C:\Windows\system32\rrinstaller.exe
        1⤵
          PID:2288
        • C:\Users\Admin\AppData\Local\ClU5wg\rrinstaller.exe
          C:\Users\Admin\AppData\Local\ClU5wg\rrinstaller.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1432

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\88XD\VERSION.dll

          Filesize

          987KB

          MD5

          e25445e69794b4f297e6ba918e3d98d8

          SHA1

          4a51311a2370adf33e472e966393baccc480f33b

          SHA256

          222686e10f2bdb56017d8ef3bd2aa0adb5d850e1834848a09fc5478f30e87832

          SHA512

          853ceac6c97854cc6d613b8ddda358929d59d8172d429e82404d0f6a6b5cf7b289461f9d3746080b05fcc723b792886b7cc6a8dc58c15a490dbad06e4b979197

        • C:\Users\Admin\AppData\Local\9UUO\dwmapi.dll

          Filesize

          988KB

          MD5

          a05902a24efcd28d2c4458203c1f5898

          SHA1

          509dd61a82deaf992560fec41f880e176e123fd3

          SHA256

          c141225e1e73e676c2be9cda5abb931ac714612375cdbcd25ed399023ac7f3e7

          SHA512

          3f56cc9d176a6890964475f89387e803d2e8e1a434df4faa916d396fc41dd6e2f83fc2fc687d9331a3c673613b6f1cbdc816bcbe4afdf5f47d6ae3f88b29a12a

        • C:\Users\Admin\AppData\Local\ClU5wg\MFPlat.DLL

          Filesize

          992KB

          MD5

          e7e5cee69733c66d6902102e0f648218

          SHA1

          d5ba66dec04f2e675482764ae5a6422de190c81e

          SHA256

          989b95a226e0fedeab81b53ded503ae1941b977514ccd0b385bbb614ef79dc32

          SHA512

          8df9941ce43a6f4a9bdc3167b18131e2422bd2c4614d7ef6aae57516e1e97f6d7faa766c645c73557ea052a3901321941a6962836065710608c129a762a8e5b9

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ppapbotpack.lnk

          Filesize

          1KB

          MD5

          3e83deff6533f1a707eb1119414c978a

          SHA1

          4a625a44026f10beee335b8de2a46b4fe7ab4cd1

          SHA256

          2b917b9d324b602f57fcc03c84c87124f173bbb11ea80edae305bd3e1e5e018a

          SHA512

          7e1b54d69bc525f2acb4c51ab615e6c546f72e2c5a3dce646413d6f0fbfbecafd0af0f89af3a3bde42d9e227bd80c7e40bfef53417099fc3999265bf8ebe7bc4

        • \Users\Admin\AppData\Local\88XD\spinstall.exe

          Filesize

          584KB

          MD5

          29c1d5b330b802efa1a8357373bc97fe

          SHA1

          90797aaa2c56fc2a667c74475996ea1841bc368f

          SHA256

          048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f

          SHA512

          66f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee

        • \Users\Admin\AppData\Local\9UUO\osk.exe

          Filesize

          676KB

          MD5

          b918311a8e59fb8ccf613a110024deba

          SHA1

          a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b

          SHA256

          e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353

          SHA512

          e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1

        • \Users\Admin\AppData\Local\ClU5wg\rrinstaller.exe

          Filesize

          54KB

          MD5

          0d3a73b0b30252680b383532f1758649

          SHA1

          9f098d2037e4dd94eca6d04c37b3d4ad8b0cc931

          SHA256

          fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc

          SHA512

          a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4

        • memory/1200-35-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-23-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-25-0x0000000076D41000-0x0000000076D42000-memory.dmp

          Filesize

          4KB

        • memory/1200-24-0x0000000002480000-0x0000000002487000-memory.dmp

          Filesize

          28KB

        • memory/1200-14-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-13-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-12-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-11-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-9-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-4-0x0000000076B36000-0x0000000076B37000-memory.dmp

          Filesize

          4KB

        • memory/1200-36-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-7-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-45-0x0000000076B36000-0x0000000076B37000-memory.dmp

          Filesize

          4KB

        • memory/1200-28-0x0000000076ED0000-0x0000000076ED2000-memory.dmp

          Filesize

          8KB

        • memory/1200-10-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-8-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/1200-5-0x00000000024A0000-0x00000000024A1000-memory.dmp

          Filesize

          4KB

        • memory/1432-89-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/1432-90-0x0000000140000000-0x00000001400FE000-memory.dmp

          Filesize

          1016KB

        • memory/1432-95-0x0000000140000000-0x00000001400FE000-memory.dmp

          Filesize

          1016KB

        • memory/2396-71-0x00000000000A0000-0x00000000000A7000-memory.dmp

          Filesize

          28KB

        • memory/2396-77-0x0000000140000000-0x00000001400FD000-memory.dmp

          Filesize

          1012KB

        • memory/2568-59-0x0000000140000000-0x00000001400FD000-memory.dmp

          Filesize

          1012KB

        • memory/2568-54-0x0000000140000000-0x00000001400FD000-memory.dmp

          Filesize

          1012KB

        • memory/2568-53-0x00000000000F0000-0x00000000000F7000-memory.dmp

          Filesize

          28KB

        • memory/2716-44-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/2716-0-0x0000000140000000-0x00000001400FC000-memory.dmp

          Filesize

          1008KB

        • memory/2716-3-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB