Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 19:22

General

  • Target

    ff362bd68f2c0d7edc8ae6daea65bff2_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    ff362bd68f2c0d7edc8ae6daea65bff2

  • SHA1

    13eec145c843327764da8f7b7bfd7497f36e9fd9

  • SHA256

    93c6d28fa2d592b75125079c8830ee790701ab730ba25a3a540c29ee6b7ecd01

  • SHA512

    c9bcaedff9f396bf4f00877d91b22c13c58cb8c31a844520424cbd8548412de6c8d02262e43eeefbfcafad5eaafaa2b767490b97efae036c7e55d671df2af5d6

  • SSDEEP

    24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N3:F9cKrUqZWLAcUv

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff362bd68f2c0d7edc8ae6daea65bff2_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1240
  • C:\Windows\system32\wscript.exe
    C:\Windows\system32\wscript.exe
    1⤵
      PID:2712
    • C:\Users\Admin\AppData\Local\MfgQW\wscript.exe
      C:\Users\Admin\AppData\Local\MfgQW\wscript.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2632
    • C:\Windows\system32\wscript.exe
      C:\Windows\system32\wscript.exe
      1⤵
        PID:3048
      • C:\Users\Admin\AppData\Local\GgYf\wscript.exe
        C:\Users\Admin\AppData\Local\GgYf\wscript.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2176
      • C:\Windows\system32\MpSigStub.exe
        C:\Windows\system32\MpSigStub.exe
        1⤵
          PID:3060
        • C:\Users\Admin\AppData\Local\OulcaxF\MpSigStub.exe
          C:\Users\Admin\AppData\Local\OulcaxF\MpSigStub.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2928

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\GgYf\VERSION.dll

          Filesize

          1.2MB

          MD5

          284c8266ea39155be12310ef54054d7c

          SHA1

          410aa4ec18265492b5cc65d44c7a37422569ce91

          SHA256

          8821d3173e4ba4ac4e05e6c3a2552027a6c7f99771dc70db3427b8472939ba25

          SHA512

          145e6e35e9ee364adb34760a2279d83eeebd04893a0e4047f29c75d52f9b8dcb0e12e669fc267c97ab5a37445dd26fbaaa91413e5b3003354d254e1d0656ea20

        • C:\Users\Admin\AppData\Local\MfgQW\VERSION.dll

          Filesize

          1.2MB

          MD5

          825bc0ea5d2bece24169d0d224ba3134

          SHA1

          c545dc8141ba82f4a17844194c7850a44fdceba6

          SHA256

          34f8d34d24fc4db2e62c63860d6382c6f839f1ec337eb248de05684024b7998d

          SHA512

          0f5df5b38ab27898cf33dc7ffefbb7dae6ccf49137a1680fd94fbf8b606edf5322858dafc3d3ef464efe62bed9513560c8bad15c43a00ddd4b7ed333bf39c896

        • C:\Users\Admin\AppData\Local\MfgQW\wscript.exe

          Filesize

          165KB

          MD5

          8886e0697b0a93c521f99099ef643450

          SHA1

          851bd390bf559e702b8323062dbeb251d9f2f6f7

          SHA256

          d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f

          SHA512

          fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837

        • C:\Users\Admin\AppData\Local\OulcaxF\VERSION.dll

          Filesize

          1.2MB

          MD5

          7a99d60fb0bdba900914a34e2e3bc970

          SHA1

          c28665743324e25e9d6d5f8550839292838cbe02

          SHA256

          6a7c50786db8bc270130d009021de39762e86ae4699715c7ae33e69a685d504a

          SHA512

          bf2339ce13040553dde57962efb4777538ecfbbcb80ee91330450ea687a6bab27b0c0c2a78430791c0c00cba6462f623b0d27852bca0697f8430bea9e592d930

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Gwifj.lnk

          Filesize

          1KB

          MD5

          46b67cac37bebe3256b6610942eb7ddd

          SHA1

          613310617a50b894c979456649a7b129e9f7855b

          SHA256

          d3aa63870b4e56bf2d487a6a60f7279720b856b78410cd649d1801c681f76558

          SHA512

          af464d9ac586f8d0f22a5a8ebf919839698c432766fc9b7a6e533abc2c48e1be9643f3519e932a5e5e4ee323affdec2e9c950bce3b2774518339b4073117f636

        • \Users\Admin\AppData\Local\OulcaxF\MpSigStub.exe

          Filesize

          264KB

          MD5

          2e6bd16aa62e5e95c7b256b10d637f8f

          SHA1

          350be084477b1fe581af83ca79eb58d4defe260f

          SHA256

          d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3

          SHA512

          1f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542

        • memory/1216-25-0x00000000025E0000-0x00000000025E7000-memory.dmp

          Filesize

          28KB

        • memory/1216-46-0x0000000076CA6000-0x0000000076CA7000-memory.dmp

          Filesize

          4KB

        • memory/1216-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-4-0x0000000076CA6000-0x0000000076CA7000-memory.dmp

          Filesize

          4KB

        • memory/1216-29-0x0000000076F40000-0x0000000076F42000-memory.dmp

          Filesize

          8KB

        • memory/1216-28-0x0000000076DB1000-0x0000000076DB2000-memory.dmp

          Filesize

          4KB

        • memory/1216-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-36-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-37-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-5-0x0000000002E10000-0x0000000002E11000-memory.dmp

          Filesize

          4KB

        • memory/1216-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1216-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-45-0x000007FEF59C0000-0x000007FEF5AF0000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-0-0x000007FEF59C0000-0x000007FEF5AF0000-memory.dmp

          Filesize

          1.2MB

        • memory/1240-3-0x0000000001E80000-0x0000000001E87000-memory.dmp

          Filesize

          28KB

        • memory/2176-78-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB

        • memory/2176-79-0x000007FEF59B0000-0x000007FEF5AE1000-memory.dmp

          Filesize

          1.2MB

        • memory/2176-84-0x000007FEF59B0000-0x000007FEF5AE1000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-58-0x000007FEF64C0000-0x000007FEF65F1000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-63-0x000007FEF64C0000-0x000007FEF65F1000-memory.dmp

          Filesize

          1.2MB

        • memory/2632-57-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2928-96-0x00000000000F0000-0x00000000000F7000-memory.dmp

          Filesize

          28KB

        • memory/2928-102-0x000007FEF59B0000-0x000007FEF5AE1000-memory.dmp

          Filesize

          1.2MB