Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 10:43

General

  • Target

    211cf9ae6ca6a0e4a98dacd5eda8d14a_JaffaCakes118.dll

  • Size

    2.3MB

  • MD5

    211cf9ae6ca6a0e4a98dacd5eda8d14a

  • SHA1

    ef0761f5ae25b3dfdf9f57941134dd26924867f3

  • SHA256

    b579608532ee7162cb68571b74d3b13838d6719133f75eaa6cb3c7a57bfe231f

  • SHA512

    37810a5d53e9f846c2f7c76bb02d92fe58af6efe0f25e31f260f0ce4860df01ab7cd1128825323fef607731d0f6e57c2b7bc249b508f7cce0c39684a213347f3

  • SSDEEP

    12288:/VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1gpE:2fP7fWsK5z9A+WGAW+V5SB6Ct4bnbg

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\211cf9ae6ca6a0e4a98dacd5eda8d14a_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1152
  • C:\Windows\system32\SystemPropertiesComputerName.exe
    C:\Windows\system32\SystemPropertiesComputerName.exe
    1⤵
      PID:2712
    • C:\Users\Admin\AppData\Local\ggL1Lqw\SystemPropertiesComputerName.exe
      C:\Users\Admin\AppData\Local\ggL1Lqw\SystemPropertiesComputerName.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2772
    • C:\Windows\system32\BitLockerWizard.exe
      C:\Windows\system32\BitLockerWizard.exe
      1⤵
        PID:2216
      • C:\Users\Admin\AppData\Local\Tvzl\BitLockerWizard.exe
        C:\Users\Admin\AppData\Local\Tvzl\BitLockerWizard.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:556
      • C:\Windows\system32\psr.exe
        C:\Windows\system32\psr.exe
        1⤵
          PID:2700
        • C:\Users\Admin\AppData\Local\UEV\psr.exe
          C:\Users\Admin\AppData\Local\UEV\psr.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1792

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Tvzl\BitLockerWizard.exe

          Filesize

          98KB

          MD5

          08a761595ad21d152db2417d6fdb239a

          SHA1

          d84c1bc2e8c9afce9fb79916df9bca169f93a936

          SHA256

          ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620

          SHA512

          8b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9

        • C:\Users\Admin\AppData\Local\ggL1Lqw\SystemPropertiesComputerName.exe

          Filesize

          80KB

          MD5

          bd889683916aa93e84e1a75802918acf

          SHA1

          5ee66571359178613a4256a7470c2c3e6dd93cfa

          SHA256

          0e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf

          SHA512

          9d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Yjafzwirjcl.lnk

          Filesize

          1KB

          MD5

          e694f7445b9aa8ff997f3dbd7605e12a

          SHA1

          bad36e9044e53aa523a1eb9e440c396b6351d198

          SHA256

          0a045c54f7362a1fd1776c8471c6fd7f71fcb3edd1e7cc7a1cdb164536d5c863

          SHA512

          90d6c66217b0a83b4528d730ee51a5822c58f1f25e2812c9a9e6dc7c63764cf5a33f5f0aeeba2ca04c3232c7e9f7dc2a5e0fa5f2d4dfa4a70ca77f8371d339e4

        • \Users\Admin\AppData\Local\Tvzl\FVEWIZ.dll

          Filesize

          2.3MB

          MD5

          034cb8c738350b04c89535e9ef65adb1

          SHA1

          859b8b43a7f5ee09504cb8a88eda845bb55e6d1f

          SHA256

          13e079777d3c8971829475738f203951a633ad0ea41c2a75d96e5e190dc518a0

          SHA512

          96a27873b1a4e0a6b57b3c307b0ecc418883cdab0c7a992ba1f11afa71947f73c63ebf9ee6ac7f66564c938d3d1d8173c66b071767c1f721b1e990cf33d448c2

        • \Users\Admin\AppData\Local\UEV\VERSION.dll

          Filesize

          2.3MB

          MD5

          6afb8737b69dd6bdda36539be90e0a9d

          SHA1

          bce950f82aff7d91a49c3141af80b20f5a9cb572

          SHA256

          48a54b412f3eeb87f867c3492cbfcac2508215826b6e4ff3c00b809c4ae01678

          SHA512

          ecf3e43bc9a0d1de9d618ac88fffd65e925dd99705524b79989df2606d3bc5357fcb30ad5f1eae097bbcb3442456a8adb5790c5fa9686fa4ea40ba74fa704afe

        • \Users\Admin\AppData\Local\UEV\psr.exe

          Filesize

          715KB

          MD5

          a80527109d75cba125d940b007eea151

          SHA1

          facf32a9ede6abfaa09368bfdfcfec8554107272

          SHA256

          68910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495

          SHA512

          77b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774

        • \Users\Admin\AppData\Local\ggL1Lqw\SYSDM.CPL

          Filesize

          2.3MB

          MD5

          283aefe055aaac60fa9be461edb72085

          SHA1

          31b8f9c2813a1be6c8a1effc20ddbb0cff48df51

          SHA256

          fcd6c75a007a7c46ccf5134f7d329d88d14b89091b9f64ac2271485a1e8914d7

          SHA512

          f3b4785c124e90daccd9c7137d1543e3826d865d8e09e9cd7deeb5f27a81f628c832d5c4077a928e102bd2f2249c96f19f264aea987381881a6efe5b89a05c13

        • memory/556-115-0x0000000000280000-0x0000000000287000-memory.dmp

          Filesize

          28KB

        • memory/1152-10-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1152-0-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1152-1-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB

        • memory/1204-47-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-40-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-48-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-42-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-13-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-32-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-11-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-23-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-9-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-4-0x0000000077886000-0x0000000077887000-memory.dmp

          Filesize

          4KB

        • memory/1204-16-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-8-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-152-0x0000000077886000-0x0000000077887000-memory.dmp

          Filesize

          4KB

        • memory/1204-7-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-71-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-68-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-61-0x0000000077BF0000-0x0000000077BF2000-memory.dmp

          Filesize

          8KB

        • memory/1204-60-0x0000000077A91000-0x0000000077A92000-memory.dmp

          Filesize

          4KB

        • memory/1204-57-0x0000000002D70000-0x0000000002D77000-memory.dmp

          Filesize

          28KB

        • memory/1204-56-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-49-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-5-0x0000000002D90000-0x0000000002D91000-memory.dmp

          Filesize

          4KB

        • memory/1204-46-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-45-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-44-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-43-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-41-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-12-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-39-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-38-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-37-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-36-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-35-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-34-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-33-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-31-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-30-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-29-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-28-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-27-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-26-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-25-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-24-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-22-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-21-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-20-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-19-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-18-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-17-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-15-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1204-14-0x0000000140000000-0x0000000140248000-memory.dmp

          Filesize

          2.3MB

        • memory/1792-134-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2772-90-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB