Analysis

  • max time kernel
    149s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 12:58

General

  • Target

    efd947775c2bfaf5633f4b00f3035c93_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    efd947775c2bfaf5633f4b00f3035c93

  • SHA1

    cef407cc42529ff19d9755c113c15fea7fb2c8c2

  • SHA256

    c5b3d45cf71bfd6e89a73ea63c7afd688c327595456df2d1894c336006261ece

  • SHA512

    00aa40aafc047ab32d91ba504314548d6dd1aad286cc4d5f6aa447442df51b740e6c299c082dec75997d3d25423fc28df0ce3a8012bf280dc9d7a6fc428a62bc

  • SSDEEP

    24576:1VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:1V8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\efd947775c2bfaf5633f4b00f3035c93_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:3960
  • C:\Windows\system32\omadmclient.exe
    C:\Windows\system32\omadmclient.exe
    1⤵
      PID:1212
    • C:\Users\Admin\AppData\Local\rlE\omadmclient.exe
      C:\Users\Admin\AppData\Local\rlE\omadmclient.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:764
    • C:\Windows\system32\lpksetup.exe
      C:\Windows\system32\lpksetup.exe
      1⤵
        PID:1604
      • C:\Users\Admin\AppData\Local\OL4EL\lpksetup.exe
        C:\Users\Admin\AppData\Local\OL4EL\lpksetup.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1740
      • C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe
        C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe
        1⤵
          PID:536
        • C:\Users\Admin\AppData\Local\fpAslJcI\SystemPropertiesDataExecutionPrevention.exe
          C:\Users\Admin\AppData\Local\fpAslJcI\SystemPropertiesDataExecutionPrevention.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3668

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\OL4EL\dpx.dll

          Filesize

          1.2MB

          MD5

          beca557fa0c0550a63aeb0d7ca3cefe3

          SHA1

          7e47a69f720a6c7130367b5816e6fe2cbedf1aa2

          SHA256

          83700fe76fb1c09a5f7bfe58bbfef6c436bd1d2101ddf73d559776906e9cbb4b

          SHA512

          64167ea9e8d3bf71d82070b200cde27634273f25ee1b270407fec8099c2977227cbc99a5b9395844b6581b00dba602626d5d5e3f2f18389706e732def5eb6a78

        • C:\Users\Admin\AppData\Local\OL4EL\lpksetup.exe

          Filesize

          728KB

          MD5

          c75516a32e0aea02a184074d55d1a997

          SHA1

          f9396946c078f8b0f28e3a6e21a97eeece31d13f

          SHA256

          cb3cbeaaff7c07b044f70177e2899a87e80840d177238eb7dd25b8d9e20bef22

          SHA512

          92994fdb75b15742e33e6d7a499664b722e45b9c160d8cc42d30bc727044063d589f45853692b5b754df6ff0fd21294dc32fed985b153f93f4bcf9f8c89a5bcc

        • C:\Users\Admin\AppData\Local\fpAslJcI\SYSDM.CPL

          Filesize

          1.2MB

          MD5

          eb1ead6ab091fb5f935d332074644c2c

          SHA1

          95f588dd5ecda84782ab6a69ceec2aa313be230c

          SHA256

          8624e2e5e6e5a5fb65458d91ffa93c65019925661f88f838083a50fb9a3199dc

          SHA512

          67405c08d33b97e8b6f72b079e03e9bda9989a763867a089f814bf6024bb3daabc11725a935a89314b51a4e4ef9d8c53b6b614f63b73bce4cdbb7349b218207d

        • C:\Users\Admin\AppData\Local\fpAslJcI\SystemPropertiesDataExecutionPrevention.exe

          Filesize

          82KB

          MD5

          de58532954c2704f2b2309ffc320651d

          SHA1

          0a9fc98f4d47dccb0b231edf9a63309314f68e3b

          SHA256

          1f810658969560f6e7d7a14f71d1196382e53b984ca190fa9b178ac4a32acfb3

          SHA512

          d4d57cc30d9079f4e9193ba42631e8e53d86b22e9c655d7a8c25e5be0e5e1d6dfff4714ddc23e3e392809d623b4f8d43c63893f74c325fc77459ac03c7a451ed

        • C:\Users\Admin\AppData\Local\rlE\XmlLite.dll

          Filesize

          1.2MB

          MD5

          730e92cfa43dc28d6b045762a8a03b50

          SHA1

          8ca88337be2642a0dd55c6b93677ce7854a3c6b2

          SHA256

          38fc7cab810aea8525ff17a8472d146889111828b7e32c206abd48af762b15d8

          SHA512

          0a9b8632efd565c5aad421e4efaa4bb5b2a8e23df453290b82f03135c7eae86cc9c99d3e02f501d92c620fdccfed938255d41851e50d0a786a6fd33d5ced2df7

        • C:\Users\Admin\AppData\Local\rlE\omadmclient.exe

          Filesize

          425KB

          MD5

          8992b5b28a996eb83761dafb24959ab4

          SHA1

          697ecb33b8ff5b0e73ef29ce471153b368b1b729

          SHA256

          e0c6c1b082c5d61be95b7fad95155b7cb2e516d6dcd51b8e1554a176876699e7

          SHA512

          4ab0d71f6f9e5a5d0870d8e6eaa4b5db74ea6148de0a00603e3e56303d0fec4722172e0207b9678a5bd0136f2d43d43b9d34907183369ab3b9b9c1484034fe3d

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Piobvoh.lnk

          Filesize

          1KB

          MD5

          175c6ae46f066bf24c62fd3a5fbf1670

          SHA1

          38dee7f596dd9e73ec75935a8eca38aad9f828e5

          SHA256

          dd5e5316071d80dba74085785a2ff3cf09ab62ba04b7e75526ef4fdc0c53fdbd

          SHA512

          7c1a83d3fd689b10e23a5ba09c7f03e1714215340ab31ac45d1390609f7e03db129577dd08908fbe8a02d1a8b7ea43692d4f05ed5b4a5fb369d4fe38a5230095

        • memory/764-54-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/764-46-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/764-49-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/764-50-0x000001A6419B0000-0x000001A6419B7000-memory.dmp

          Filesize

          28KB

        • memory/1740-69-0x000002938AE60000-0x000002938AE67000-memory.dmp

          Filesize

          28KB

        • memory/1740-68-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/1740-73-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-33-0x0000000001040000-0x0000000001047000-memory.dmp

          Filesize

          28KB

        • memory/3552-34-0x00007FF91D270000-0x00007FF91D280000-memory.dmp

          Filesize

          64KB

        • memory/3552-15-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-7-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-5-0x00007FF91C32A000-0x00007FF91C32B000-memory.dmp

          Filesize

          4KB

        • memory/3552-9-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-10-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-11-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-13-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-16-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-4-0x0000000002A80000-0x0000000002A81000-memory.dmp

          Filesize

          4KB

        • memory/3552-8-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-36-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-25-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-14-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-12-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3668-87-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/3668-88-0x000002ABF3E80000-0x000002ABF3E87000-memory.dmp

          Filesize

          28KB

        • memory/3668-92-0x0000000140000000-0x0000000140144000-memory.dmp

          Filesize

          1.3MB

        • memory/3960-0-0x0000023540B50000-0x0000023540B57000-memory.dmp

          Filesize

          28KB

        • memory/3960-39-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB

        • memory/3960-1-0x0000000140000000-0x0000000140143000-memory.dmp

          Filesize

          1.3MB