Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 01:30

General

  • Target

    f7438adb2b9d8c162cdf100bec85ad75_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    f7438adb2b9d8c162cdf100bec85ad75

  • SHA1

    f0f7120fb5ed5cad398c73272d21335f3c63ab5f

  • SHA256

    afd7750169a65f560917f45bdad20b3785d3b8ea3bb4e4335d6a978ceec931ad

  • SHA512

    43624aeb1fd754fd98b02e6bac5e08fe64307ab2f393d8493dda6b2bed8550a01d03ed4730a81c04abc40239c46413f40a81c73565a4a8b6e7c4e8f47aa764ef

  • SSDEEP

    24576:3uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:59cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f7438adb2b9d8c162cdf100bec85ad75_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1776
  • C:\Windows\system32\dpapimig.exe
    C:\Windows\system32\dpapimig.exe
    1⤵
      PID:4492
    • C:\Users\Admin\AppData\Local\pUj41EH40\dpapimig.exe
      C:\Users\Admin\AppData\Local\pUj41EH40\dpapimig.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4628
    • C:\Windows\system32\cmstp.exe
      C:\Windows\system32\cmstp.exe
      1⤵
        PID:1312
      • C:\Users\Admin\AppData\Local\pEBC\cmstp.exe
        C:\Users\Admin\AppData\Local\pEBC\cmstp.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3668
      • C:\Windows\system32\Utilman.exe
        C:\Windows\system32\Utilman.exe
        1⤵
          PID:732
        • C:\Users\Admin\AppData\Local\koq5v8\Utilman.exe
          C:\Users\Admin\AppData\Local\koq5v8\Utilman.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1896

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\koq5v8\DUser.dll

          Filesize

          1.2MB

          MD5

          3b1e938471749ceff0809857e6e10c03

          SHA1

          89cd7b46b9141d8472e1973b3ff83717526f0c81

          SHA256

          0f572d0da1ab60837dee39a0f108677af632de27b9f29082bd8b5361c0c21502

          SHA512

          79f4f31220a2428fb39eef404ef8e49485d5ce5fb0f2eb006c235afeaf8b1d44f9e4476d88df8bade870db797a59fe1e7a76587686d80d477bbd9670c52eecc7

        • C:\Users\Admin\AppData\Local\koq5v8\Utilman.exe

          Filesize

          123KB

          MD5

          a117edc0e74ab4770acf7f7e86e573f7

          SHA1

          5ceffb1a5e05e52aafcbc2d44e1e8445440706f3

          SHA256

          b5bc4fce58403ea554691db678e6c8c448310fe59990990f0e37cd4357567d37

          SHA512

          72883f794ff585fe7e86e818d4d8c54fa9781cab6c3fac6f6956f58a016a91f676e70d14691cbe054ae7b7469c6b4783152fbb694e92b940d9e3595fe3f41d97

        • C:\Users\Admin\AppData\Local\pEBC\VERSION.dll

          Filesize

          1.2MB

          MD5

          7c146829b35cd8e0406694469ad4144b

          SHA1

          f564947a9721a2da55728a735c7efc96592868d4

          SHA256

          e26e537edaac6bb82480beb01f5fcb7d313c0b0faaf79fbb56cbbd0280a186eb

          SHA512

          b64f1f03f2711338e2836beee6193cddf0e5239fe4d7bf582e7b0b89154f61e558a52372dbed38ce6bf469a19c06e74e97d62d4f1c8d5b5c3b169b9df8430f96

        • C:\Users\Admin\AppData\Local\pEBC\cmstp.exe

          Filesize

          96KB

          MD5

          4cc43fe4d397ff79fa69f397e016df52

          SHA1

          8fd6cf81ad40c9b123cd75611860a8b95c72869c

          SHA256

          f2d3905ee38b2b5c0b724d582f14eb1db7621ffb8f3826df686a20784341614c

          SHA512

          851ef9fa5a03ec8b9fea0094c6e4bfa0b9e71cee3412ee86b2dfc34682aa5fb6455fefe7fc0092b711956d7c880cf8a5761b63ee990aa8e72f3473086ac0f157

        • C:\Users\Admin\AppData\Local\pUj41EH40\DUI70.dll

          Filesize

          1.4MB

          MD5

          47a3b60c5e29386a6203eb9b2164ed1c

          SHA1

          fac0d92197c2362bd0280c1ea787c8249b4aaa0f

          SHA256

          dafc27231589b2cce2f9ddf38c5c96640ccfd08ef971f904eb57961772c945b2

          SHA512

          73ae463c9770badb0d1cdca431255d21121f09214b7539da44c9c0423eb967aa1b4a84186c5324cd008536c6be487fd21a7d797f2e5459f7bd7a82ee27527267

        • C:\Users\Admin\AppData\Local\pUj41EH40\dpapimig.exe

          Filesize

          76KB

          MD5

          b6d6477a0c90a81624c6a8548026b4d0

          SHA1

          e6eac6941d27f76bbd306c2938c0a962dbf1ced1

          SHA256

          a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb

          SHA512

          72ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Piobvoh.lnk

          Filesize

          1KB

          MD5

          042eaf4fc83454b60e6f0c6653b9910c

          SHA1

          66a6efcb92b006e6e9eded49dd79d0e2a15608ac

          SHA256

          203f1423122095c943f461776311bcbfa38886409860964d3e20e4cf1da82113

          SHA512

          c5d9abc252f425ce04cc5410020dcec5ead5b9d53653327153fc6982a4ddefc77a78e9ec43e10ecd383bca55630439b82c5f2715d353edcf80c9ec8e30841ffa

        • memory/1776-2-0x00007FFA47B60000-0x00007FFA47C90000-memory.dmp

          Filesize

          1.2MB

        • memory/1776-0-0x0000016EFFEA0000-0x0000016EFFEA7000-memory.dmp

          Filesize

          28KB

        • memory/1776-38-0x00007FFA47B60000-0x00007FFA47C90000-memory.dmp

          Filesize

          1.2MB

        • memory/1896-88-0x00007FFA38EC0000-0x00007FFA38FF2000-memory.dmp

          Filesize

          1.2MB

        • memory/1896-83-0x00007FFA38EC0000-0x00007FFA38FF2000-memory.dmp

          Filesize

          1.2MB

        • memory/1896-82-0x000001C33E680000-0x000001C33E687000-memory.dmp

          Filesize

          28KB

        • memory/3460-35-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-5-0x00007FFA5666A000-0x00007FFA5666B000-memory.dmp

          Filesize

          4KB

        • memory/3460-4-0x0000000000F40000-0x0000000000F41000-memory.dmp

          Filesize

          4KB

        • memory/3460-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-29-0x00007FFA57070000-0x00007FFA57080000-memory.dmp

          Filesize

          64KB

        • memory/3460-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3460-28-0x0000000000970000-0x0000000000977000-memory.dmp

          Filesize

          28KB

        • memory/3668-69-0x00007FFA39070000-0x00007FFA391A1000-memory.dmp

          Filesize

          1.2MB

        • memory/3668-63-0x00000291409B0000-0x00000291409B7000-memory.dmp

          Filesize

          28KB

        • memory/3668-64-0x00007FFA39070000-0x00007FFA391A1000-memory.dmp

          Filesize

          1.2MB

        • memory/4628-51-0x00007FFA39030000-0x00007FFA391A6000-memory.dmp

          Filesize

          1.5MB

        • memory/4628-46-0x00007FFA39030000-0x00007FFA391A6000-memory.dmp

          Filesize

          1.5MB

        • memory/4628-45-0x000001E0118C0000-0x000001E0118C7000-memory.dmp

          Filesize

          28KB