Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 19:22

General

  • Target

    ff362bd68f2c0d7edc8ae6daea65bff2_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    ff362bd68f2c0d7edc8ae6daea65bff2

  • SHA1

    13eec145c843327764da8f7b7bfd7497f36e9fd9

  • SHA256

    93c6d28fa2d592b75125079c8830ee790701ab730ba25a3a540c29ee6b7ecd01

  • SHA512

    c9bcaedff9f396bf4f00877d91b22c13c58cb8c31a844520424cbd8548412de6c8d02262e43eeefbfcafad5eaafaa2b767490b97efae036c7e55d671df2af5d6

  • SSDEEP

    24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N3:F9cKrUqZWLAcUv

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff362bd68f2c0d7edc8ae6daea65bff2_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1424
  • C:\Windows\system32\msdt.exe
    C:\Windows\system32\msdt.exe
    1⤵
      PID:3768
    • C:\Users\Admin\AppData\Local\xsx4NZ1\msdt.exe
      C:\Users\Admin\AppData\Local\xsx4NZ1\msdt.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:452
    • C:\Windows\system32\psr.exe
      C:\Windows\system32\psr.exe
      1⤵
        PID:1368
      • C:\Users\Admin\AppData\Local\iqpQb\psr.exe
        C:\Users\Admin\AppData\Local\iqpQb\psr.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4932
      • C:\Windows\system32\dpapimig.exe
        C:\Windows\system32\dpapimig.exe
        1⤵
          PID:4876
        • C:\Users\Admin\AppData\Local\b3hpVrvk\dpapimig.exe
          C:\Users\Admin\AppData\Local\b3hpVrvk\dpapimig.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1380

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\b3hpVrvk\DUI70.dll

          Filesize

          1.4MB

          MD5

          50e65476ea6e1ab0587e9777e607fff0

          SHA1

          b0a78be1716a4e8bfcd9b6fa6965fd0ba7e0a004

          SHA256

          dc3e81ed43f141d4556d88a58c3bfb8c5198dde0c3433a8ca3fad1d3971acbf2

          SHA512

          2683dd912d4e7b10984e6151b9215d5ffa1019ce4dc01fcf880fc6f3b3a3b1cd485b7b7c8aa982965830fff63ce270ca56b3b45663fccd7bf5197dee07f5e9c0

        • C:\Users\Admin\AppData\Local\b3hpVrvk\dpapimig.exe

          Filesize

          76KB

          MD5

          b6d6477a0c90a81624c6a8548026b4d0

          SHA1

          e6eac6941d27f76bbd306c2938c0a962dbf1ced1

          SHA256

          a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb

          SHA512

          72ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe

        • C:\Users\Admin\AppData\Local\iqpQb\XmlLite.dll

          Filesize

          1.2MB

          MD5

          e5dc3f11e6188fa802177d3505e98c2f

          SHA1

          0e8f18ec49ba6b859f214ee9f21bcb878342b175

          SHA256

          45f05672551308ed2e25793eaf50109349fe6dae93244bb3c61ebec87eb518e0

          SHA512

          5b6337101bd983e642d2661592930d172e07f975bdeb1e8788a1fc669a4a8fd3ee6ed7e0c082f781399524099d63faf69d31c174bc129364e8b577a7e70cd86a

        • C:\Users\Admin\AppData\Local\iqpQb\psr.exe

          Filesize

          232KB

          MD5

          ad53ead5379985081b7c3f1f357e545a

          SHA1

          6f5aa32c1d15fbf073558fadafd046d97b60184e

          SHA256

          4f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f

          SHA512

          433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0

        • C:\Users\Admin\AppData\Local\xsx4NZ1\Secur32.dll

          Filesize

          1.2MB

          MD5

          a7d923fac93a79038729e016642b2715

          SHA1

          36e8c319411de8aa66cb4d83dabb6ab1d3aafb18

          SHA256

          377d68f322fe876127beb0073ece8bd6d234b5ab1d50c42732de7ff56205d96f

          SHA512

          60f405cca96190742463e0d0c51196061c6344acf35347dd8656a564fa07db457956b1fb79e0726180fe505e3f5e7b8bed431ef05ebbc43357bc42598fbe7905

        • C:\Users\Admin\AppData\Local\xsx4NZ1\msdt.exe

          Filesize

          421KB

          MD5

          992c3f0cc8180f2f51156671e027ae75

          SHA1

          942ec8c2ccfcacd75a1cd86cbe8873aee5115e29

          SHA256

          6859d1b5d1beaa2985b298f3fcee67f0aac747687a9dec2b4376585e99e9756f

          SHA512

          1f1b8d39e29274cfc87a9ef1510adb9c530086a421c121523376731c8933c6e234e9146310d3767ce888a8dce7a5713221f4d25e5b7b6398d06ae2be2b99eadf

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Wyfsbgf.lnk

          Filesize

          1KB

          MD5

          f4920cd2d2c060887c2af3e608a5f1f3

          SHA1

          6ea65375841291ea84deb349413636b5a4f7ba26

          SHA256

          8c66c0f27ea8629bac642a40d5361e99b7baab4dace7cc419da6f63a781a6315

          SHA512

          e49ead99de1df2f5bbee06a720e6b0f07f1f967eade4efe9f9739132791a81b52b665f22a8759c7686887f141cdd92b100b87a9f3f96f49ddd8b2a1d5219f551

        • memory/452-45-0x00007FFFE4A30000-0x00007FFFE4B61000-memory.dmp

          Filesize

          1.2MB

        • memory/452-48-0x000002A87DCF0000-0x000002A87DCF7000-memory.dmp

          Filesize

          28KB

        • memory/452-51-0x00007FFFE4A30000-0x00007FFFE4B61000-memory.dmp

          Filesize

          1.2MB

        • memory/1380-86-0x00007FFFE49F0000-0x00007FFFE4B66000-memory.dmp

          Filesize

          1.5MB

        • memory/1380-80-0x00007FFFE49F0000-0x00007FFFE4B66000-memory.dmp

          Filesize

          1.5MB

        • memory/1380-82-0x00000275C6420000-0x00000275C6427000-memory.dmp

          Filesize

          28KB

        • memory/1424-0-0x000002627E590000-0x000002627E597000-memory.dmp

          Filesize

          28KB

        • memory/1424-38-0x00007FFFF4830000-0x00007FFFF4960000-memory.dmp

          Filesize

          1.2MB

        • memory/1424-2-0x00007FFFF4830000-0x00007FFFF4960000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-35-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-24-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-8-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-9-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-10-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-11-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-12-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-15-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-16-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-7-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-4-0x0000000001130000-0x0000000001131000-memory.dmp

          Filesize

          4KB

        • memory/3520-6-0x00007FF802A7A000-0x00007FF802A7B000-memory.dmp

          Filesize

          4KB

        • memory/3520-14-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/3520-25-0x00000000010C0000-0x00000000010C7000-memory.dmp

          Filesize

          28KB

        • memory/3520-26-0x00007FF802EB0000-0x00007FF802EC0000-memory.dmp

          Filesize

          64KB

        • memory/3520-13-0x0000000140000000-0x0000000140130000-memory.dmp

          Filesize

          1.2MB

        • memory/4932-69-0x00007FFFE4880000-0x00007FFFE49B1000-memory.dmp

          Filesize

          1.2MB

        • memory/4932-64-0x00007FFFE4880000-0x00007FFFE49B1000-memory.dmp

          Filesize

          1.2MB

        • memory/4932-63-0x000001FF88670000-0x000001FF88677000-memory.dmp

          Filesize

          28KB