Analysis

  • max time kernel
    149s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 10:13

General

  • Target

    ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll

  • Size

    1.4MB

  • MD5

    ef9282ff41251164cb2b293d8ebe082f

  • SHA1

    01f039edc40c69125d5c04be228eb6f7a23fb931

  • SHA256

    561f41e1bb21a3e96a3497b1ac70f8dd0026946d928d7757b659ca8518fe2f48

  • SHA512

    988b9f019112ce40c3c6cf7a2528ff094eb4684ced6310232d9b5326bb07e23136447a4107e961b9237bd292d3009857b15132e01256b2e89a661305e45d99d2

  • SSDEEP

    24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NaiH/:G9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2560
  • C:\Windows\system32\mspaint.exe
    C:\Windows\system32\mspaint.exe
    1⤵
      PID:2316
    • C:\Users\Admin\AppData\Local\cgyXrff5u\mspaint.exe
      C:\Users\Admin\AppData\Local\cgyXrff5u\mspaint.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4964
    • C:\Windows\system32\sethc.exe
      C:\Windows\system32\sethc.exe
      1⤵
        PID:4056
      • C:\Users\Admin\AppData\Local\Tr7TKw\sethc.exe
        C:\Users\Admin\AppData\Local\Tr7TKw\sethc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4476
      • C:\Windows\system32\unregmp2.exe
        C:\Windows\system32\unregmp2.exe
        1⤵
          PID:1328
        • C:\Users\Admin\AppData\Local\67Mhng\unregmp2.exe
          C:\Users\Admin\AppData\Local\67Mhng\unregmp2.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2580

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\67Mhng\VERSION.dll

          Filesize

          1.4MB

          MD5

          4b89f6e04088ebf1e0164fcb8da15fad

          SHA1

          e3e8ddcf00de176119b926baf8857fcd4fcde8be

          SHA256

          2c53697e7e5c3bf09cc6a9c9555da95986eb612802569d93e8865717f02236da

          SHA512

          189949e041f4615d5201295218c77cd8d4afc30b5920d3da1ab44dc1741024232ec512ea870665f741e724fbe00c85a4f8b41b072d156273034c615be84bfa2b

        • C:\Users\Admin\AppData\Local\67Mhng\unregmp2.exe

          Filesize

          259KB

          MD5

          a6fc8ce566dec7c5873cb9d02d7b874e

          SHA1

          a30040967f75df85a1e3927bdce159b102011a61

          SHA256

          21f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d

          SHA512

          f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc

        • C:\Users\Admin\AppData\Local\Tr7TKw\UxTheme.dll

          Filesize

          1.4MB

          MD5

          c14a8eac8ff10f60464cd1cab2636110

          SHA1

          0995fc80027a55f8dab632386f284663a74b00b6

          SHA256

          219712eced8756450c7bb7f434ef99f48fa32acb98b625cb1f44c044ae3030e6

          SHA512

          9e5b554f7f3ce113486d96683e9f442ba6d25d1514f997b031994cd8023c06c8d4482bff93cc7e3289843082fcec23c4547d4484ae0de50e68dc37ca597d05d3

        • C:\Users\Admin\AppData\Local\Tr7TKw\sethc.exe

          Filesize

          104KB

          MD5

          8ba3a9702a3f1799431cad6a290223a6

          SHA1

          9c7dc9b6830297c8f759d1f46c8b36664e26c031

          SHA256

          615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8

          SHA512

          680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746

        • C:\Users\Admin\AppData\Local\cgyXrff5u\MFC42u.dll

          Filesize

          1.4MB

          MD5

          eb19c10eb0fecc111188118f1875a1b1

          SHA1

          19d1413be4bb9e7f59b66c830faf4bbaf8a39d55

          SHA256

          24f5ffd73e1c6173a1b713fdceb01dc89e69672707d9a8f262b7e03cbd03ff48

          SHA512

          9bd8633d33623ea688d375cc714913952f26c76d5557812047ecd32ce53b7f6b59b8acb5b1eb366d0d1036f3c6910b57306871d7d127696c1778f855b93a1afd

        • C:\Users\Admin\AppData\Local\cgyXrff5u\mspaint.exe

          Filesize

          965KB

          MD5

          f221a4ccafec690101c59f726c95b646

          SHA1

          2098e4b62eaab213cbee73ba40fe4f1b8901a782

          SHA256

          94aa32a2c9c1d2db78318d9c68262c2f834abe26b6e9a661700324b55fdd5709

          SHA512

          8e3f4e4f68565ef09f5e762d6bb41b160711bbacac9dfcbe33edea9885fd042e6ce9a248bfcc62f9cffdb8e6bbe1b04c89bd41fcd9a373a5c8bc7bbff96dceaf

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Sfbjsepzltomqmf.lnk

          Filesize

          1KB

          MD5

          eabc59ded29fe9a2f9a8c1724d6b7026

          SHA1

          f6d2ef392cfefc90fb0537eb31358d14b4e41e71

          SHA256

          b276a96844f73a50361d8827da627ec277b77b8d9aff1d55f61ede2bd9868472

          SHA512

          68442af426d206fa4263916828a86f88b22700e6c177839fe80047c18581d211fe96512d1e57ed2513c6daef527c89f2fc31576078a7bebaf29b42f6742007e8

        • memory/2560-0-0x0000021A961E0000-0x0000021A961E7000-memory.dmp

          Filesize

          28KB

        • memory/2560-40-0x00007FFEA1230000-0x00007FFEA13A3000-memory.dmp

          Filesize

          1.4MB

        • memory/2560-2-0x00007FFEA1230000-0x00007FFEA13A3000-memory.dmp

          Filesize

          1.4MB

        • memory/2580-78-0x00007FFE91C10000-0x00007FFE91D84000-memory.dmp

          Filesize

          1.5MB

        • memory/2580-81-0x00000288CA330000-0x00000288CA337000-memory.dmp

          Filesize

          28KB

        • memory/2580-84-0x00007FFE91C10000-0x00007FFE91D84000-memory.dmp

          Filesize

          1.5MB

        • memory/3516-30-0x0000000000C00000-0x0000000000C07000-memory.dmp

          Filesize

          28KB

        • memory/3516-17-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-12-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-11-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-10-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-9-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-8-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-14-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-15-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-37-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-5-0x00007FFEAF4CA000-0x00007FFEAF4CB000-memory.dmp

          Filesize

          4KB

        • memory/3516-4-0x00000000027D0000-0x00000000027D1000-memory.dmp

          Filesize

          4KB

        • memory/3516-7-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-19-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-31-0x00007FFEAFE50000-0x00007FFEAFE60000-memory.dmp

          Filesize

          64KB

        • memory/3516-16-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-13-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/3516-26-0x0000000140000000-0x0000000140173000-memory.dmp

          Filesize

          1.4MB

        • memory/4476-64-0x00000217575D0000-0x00000217575D7000-memory.dmp

          Filesize

          28KB

        • memory/4476-67-0x00007FFE91A60000-0x00007FFE91BD4000-memory.dmp

          Filesize

          1.5MB

        • memory/4476-61-0x00007FFE91A60000-0x00007FFE91BD4000-memory.dmp

          Filesize

          1.5MB

        • memory/4964-52-0x00007FFE91E70000-0x00007FFE91FEA000-memory.dmp

          Filesize

          1.5MB

        • memory/4964-48-0x00007FFE91E70000-0x00007FFE91FEA000-memory.dmp

          Filesize

          1.5MB

        • memory/4964-51-0x000001A367AB0000-0x000001A367AB7000-memory.dmp

          Filesize

          28KB