Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 05:42

General

  • Target

    049096c3169d8d3df37231056cc1ddc5_JaffaCakes118.dll

  • Size

    1.3MB

  • MD5

    049096c3169d8d3df37231056cc1ddc5

  • SHA1

    a11b8d2b9144cfd9d15bb696ac117ab725484e86

  • SHA256

    221471dd6a3b6edc506fd5e9e0d32c3bd5fb95f631ef02bb2dfa56ff04a9e248

  • SHA512

    1c63495a42cf214e9a475877e94fe51994efa724c1f189209e7ed4503d3e52da46dcf34d4bbea055534db6b1fee9f5c8f1ebe42da60d4c2fa375688ec83fa9a2

  • SSDEEP

    12288:cdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:uMIJxSDX3bqjhcfHk7MzH6z

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\049096c3169d8d3df37231056cc1ddc5_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2732
  • C:\Windows\system32\unregmp2.exe
    C:\Windows\system32\unregmp2.exe
    1⤵
      PID:2972
    • C:\Users\Admin\AppData\Local\diDM\unregmp2.exe
      C:\Users\Admin\AppData\Local\diDM\unregmp2.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1664
    • C:\Windows\system32\icardagt.exe
      C:\Windows\system32\icardagt.exe
      1⤵
        PID:2148
      • C:\Users\Admin\AppData\Local\7cdPU\icardagt.exe
        C:\Users\Admin\AppData\Local\7cdPU\icardagt.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2896
      • C:\Windows\system32\dvdupgrd.exe
        C:\Windows\system32\dvdupgrd.exe
        1⤵
          PID:844
        • C:\Users\Admin\AppData\Local\BGQH1ion8\dvdupgrd.exe
          C:\Users\Admin\AppData\Local\BGQH1ion8\dvdupgrd.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2552

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\7cdPU\VERSION.dll

          Filesize

          1.3MB

          MD5

          fd6b639b7bf1771bf1c2217fbf423176

          SHA1

          4461d0c8f2d1ab2329cb8d51dde204896c402c31

          SHA256

          9fbe56e97b7fa6331c8cb6ad940d85fb1b69dc444894a7b6b5e7a315277c701d

          SHA512

          0d7e935a2ec9178e95d7ba3ca7ad93f88371f75090fe0d9737a94e6b6190a3ba2621614963657442ebf9c52fe6520fa161687921c52d5ef344869072b51d177b

        • C:\Users\Admin\AppData\Local\BGQH1ion8\VERSION.dll

          Filesize

          1.3MB

          MD5

          9a327701c12023dad60b22bd79a84ec4

          SHA1

          793969b7190c34acc38b695d4e6ec92039093393

          SHA256

          78e0fd305dd7df4444fd0796d7101caa46755b90e253dade18477cbfb80d4193

          SHA512

          05179ef05fb0c55d60149b4a302a337213fa8140055a59808a5af5998959c7d398fc7e8f3234da920c9b1eca2556e944c4cf50dc7f2a57f0038e04fb02de95d4

        • C:\Users\Admin\AppData\Local\diDM\slc.dll

          Filesize

          1.3MB

          MD5

          206fc377d7d25be7220b18dcaeebb261

          SHA1

          f8eb8739a9e810e68e2f3d6a79017866236409aa

          SHA256

          910b9240ffe0bb73cb7fcee9adf66c890ff0abd29aefd0f1d16d38ecf43bba51

          SHA512

          14a64e45b81157d7c58b88b2e0d8c38aac40cc215fbb2eb69bd21a5829f4c6e32334a9770743cb0d76bea2d87689a29d957e30cf657bd0d5120a2b1b0f6a4370

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Wzkhocxsoqdr.lnk

          Filesize

          1017B

          MD5

          a8797d6b0ae7bb81b5bc22ce384fe321

          SHA1

          9428a492ca416a93c0dca19d88a15739ca29f5d5

          SHA256

          9c8bff88d014c50fc7ccc515b4fc5d5139a2eb0b0c7cea189f02d00de334e144

          SHA512

          af0d8813212e82840acf8aab04fe8c724e05989f9d5fba0f22d2bd3d240193f1636339d69c032bd028d5528bfaccd1d56c3df8b0d885a751c92f3aac6e4e831e

        • \Users\Admin\AppData\Local\7cdPU\icardagt.exe

          Filesize

          1.3MB

          MD5

          2fe97a3052e847190a9775431292a3a3

          SHA1

          43edc451ac97365600391fa4af15476a30423ff6

          SHA256

          473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7

          SHA512

          93ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a

        • \Users\Admin\AppData\Local\BGQH1ion8\dvdupgrd.exe

          Filesize

          25KB

          MD5

          75a9b4172eac01d9648c6d2133af952f

          SHA1

          63c7e1af762d2b584e9cc841e8b0100f2a482b81

          SHA256

          18f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736

          SHA512

          5a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769

        • \Users\Admin\AppData\Local\diDM\unregmp2.exe

          Filesize

          316KB

          MD5

          64b328d52dfc8cda123093e3f6e4c37c

          SHA1

          f68f45b21b911906f3aa982e64504e662a92e5ab

          SHA256

          7d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1

          SHA512

          e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00

        • memory/1228-24-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-31-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-8-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-43-0x0000000077820000-0x0000000077822000-memory.dmp

          Filesize

          8KB

        • memory/1228-42-0x00000000777F0000-0x00000000777F2000-memory.dmp

          Filesize

          8KB

        • memory/1228-41-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-3-0x0000000077486000-0x0000000077487000-memory.dmp

          Filesize

          4KB

        • memory/1228-28-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-23-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-22-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-49-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-48-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-18-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-19-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-16-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-13-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-14-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-12-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-10-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-11-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-7-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-40-0x0000000002270000-0x0000000002277000-memory.dmp

          Filesize

          28KB

        • memory/1228-32-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-9-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-30-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-29-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-27-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-26-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-25-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-15-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-4-0x00000000026A0000-0x00000000026A1000-memory.dmp

          Filesize

          4KB

        • memory/1228-58-0x0000000077486000-0x0000000077487000-memory.dmp

          Filesize

          4KB

        • memory/1228-21-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-20-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-6-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1228-17-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/1664-71-0x0000000140000000-0x000000014014D000-memory.dmp

          Filesize

          1.3MB

        • memory/1664-67-0x0000000140000000-0x000000014014D000-memory.dmp

          Filesize

          1.3MB

        • memory/1664-66-0x0000000000070000-0x0000000000077000-memory.dmp

          Filesize

          28KB

        • memory/2552-100-0x0000000000160000-0x0000000000167000-memory.dmp

          Filesize

          28KB

        • memory/2552-105-0x0000000140000000-0x000000014014D000-memory.dmp

          Filesize

          1.3MB

        • memory/2732-57-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/2732-1-0x0000000140000000-0x000000014014C000-memory.dmp

          Filesize

          1.3MB

        • memory/2732-0-0x0000000000200000-0x0000000000207000-memory.dmp

          Filesize

          28KB

        • memory/2896-83-0x00000000001F0000-0x00000000001F7000-memory.dmp

          Filesize

          28KB

        • memory/2896-88-0x0000000140000000-0x000000014014D000-memory.dmp

          Filesize

          1.3MB