Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 21:46

General

  • Target

    fd3e806f4332bfcfa93533beca89df80_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    fd3e806f4332bfcfa93533beca89df80

  • SHA1

    d11032403375abd3d628e983a64ab2d80ab476c7

  • SHA256

    2804e639a5387ba5851a66fd0aca15bec2e3e20fcedbe56b93136828af8e933b

  • SHA512

    ed0bd11263b65dda4794aba95bbfa621c83377230ef333e89e245ec96befb231fa513b43937e0814d54591bef0faceeba7ffe11915e90191a0fb0cb74e7c4d0f

  • SSDEEP

    12288:lVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:8fP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fd3e806f4332bfcfa93533beca89df80_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:3252
  • C:\Windows\system32\WindowsActionDialog.exe
    C:\Windows\system32\WindowsActionDialog.exe
    1⤵
      PID:1964
    • C:\Users\Admin\AppData\Local\TtON\WindowsActionDialog.exe
      C:\Users\Admin\AppData\Local\TtON\WindowsActionDialog.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1180
    • C:\Windows\system32\DmNotificationBroker.exe
      C:\Windows\system32\DmNotificationBroker.exe
      1⤵
        PID:372
      • C:\Users\Admin\AppData\Local\fZ8E2pDk\DmNotificationBroker.exe
        C:\Users\Admin\AppData\Local\fZ8E2pDk\DmNotificationBroker.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3196
      • C:\Windows\system32\slui.exe
        C:\Windows\system32\slui.exe
        1⤵
          PID:2496
        • C:\Users\Admin\AppData\Local\stpo\slui.exe
          C:\Users\Admin\AppData\Local\stpo\slui.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3596

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\TtON\DUI70.dll

          Filesize

          1.4MB

          MD5

          e971cd5b27a0c6cef5bd4c322404c98a

          SHA1

          52562ea45eb39b6ea46a47d0f2816be7fc17977f

          SHA256

          90428944d63e080308681e0cb8f372267b16b5152164a523d19a287869f21690

          SHA512

          10da1375e9b007e7878f5db228deb2c5c8dfd7160bec4532fb0999e4c62ac9026575d8b12e3e4d43721b0db9640ae09fb1ec5b5b7f041ee71e78262c9c5f0e0c

        • C:\Users\Admin\AppData\Local\TtON\WindowsActionDialog.exe

          Filesize

          61KB

          MD5

          73c523b6556f2dc7eefc662338d66f8d

          SHA1

          1e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5

          SHA256

          0c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31

          SHA512

          69d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912

        • C:\Users\Admin\AppData\Local\fZ8E2pDk\DUI70.dll

          Filesize

          1.4MB

          MD5

          e368f79d043736d9844a60b3bef5c251

          SHA1

          13fe159facab571ea5571257fcc303088bd9ec53

          SHA256

          c037f14ee795fa39d38593d4db38aa082f6a4b128887e274dc02664867d87480

          SHA512

          d9b40426f0b289f29f951391c43d518fdb1bb0ebef240a39b858523a28cf7a2319814176db5e7e171c61e9abe4a30f2cc536aaaf951d0bdd30433f7942a1616b

        • C:\Users\Admin\AppData\Local\fZ8E2pDk\DmNotificationBroker.exe

          Filesize

          32KB

          MD5

          f0bdc20540d314a2aad951c7e2c88420

          SHA1

          4ab344595a4a81ab5f31ed96d72f217b4cee790b

          SHA256

          f87537e5f26193a2273380f86cc9ac16d977f65b0eff2435e40be830fd99f7b5

          SHA512

          cb69e35b2954406735264a4ae8fe1eca1bd4575f553ab2178c70749ab997bda3c06496d2fce97872c51215a19093e51eea7cc8971af62ad9d5726f3a0d2730aa

        • C:\Users\Admin\AppData\Local\stpo\WINBRAND.dll

          Filesize

          1.2MB

          MD5

          16a7ca87c1157ac075131262fe31fa27

          SHA1

          dd856d6186dc21627aa5e01c508a2dd636888dc4

          SHA256

          86e468e00a50e0bd8f5cee09b7e1a967d936c22fd23dc683e9678d1cae1df28b

          SHA512

          16fd8cebddfdda1a64bc666097e7c3a0961432abd5742141b88ac4163aa474d281f09f48c7537dfcb70d9173fdb87fc73d39b88cd4a2ae7bb6c2eedfd77ae9d0

        • C:\Users\Admin\AppData\Local\stpo\slui.exe

          Filesize

          534KB

          MD5

          eb725ea35a13dc18eac46aa81e7f2841

          SHA1

          c0b3304c970324952e18c4a51073e3bdec73440b

          SHA256

          25e7624d469a592934ab8c509d12c153c2799e604c2a4b8a83650a7268577dff

          SHA512

          39192a1fad29654b3769f007298eff049d0688a3cb51390833ec563f44f9931cd3f6f8693db37b649b061b5aab379b166c15dade56d0fc414375243320375b26

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ybgihhkn.lnk

          Filesize

          1KB

          MD5

          cd1fb6e72add2942c3bf52cc6522b219

          SHA1

          a53ae95c65ea2a4fb91abea8c97460c05443026c

          SHA256

          d7a83f1bdccb7d614ce21905368dbd2384f718cbb98d19dd9287764a471a67b5

          SHA512

          a6154faef795007eac2dff8a9304761e1ebd4ed0175afd38a9f8d1d3eed6c36ffc369a75d846fcc9585a075465beacfd77a55ca878c333a5f8848a9ee994c550

        • memory/1180-77-0x0000016AAA050000-0x0000016AAA057000-memory.dmp

          Filesize

          28KB

        • memory/1180-72-0x0000000140000000-0x0000000140172000-memory.dmp

          Filesize

          1.4MB

        • memory/1180-78-0x0000000140000000-0x0000000140172000-memory.dmp

          Filesize

          1.4MB

        • memory/3196-95-0x0000000140000000-0x0000000140172000-memory.dmp

          Filesize

          1.4MB

        • memory/3196-89-0x0000019270860000-0x0000019270867000-memory.dmp

          Filesize

          28KB

        • memory/3252-3-0x000001B7D9D50000-0x000001B7D9D57000-memory.dmp

          Filesize

          28KB

        • memory/3252-0-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3252-16-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-29-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-20-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-42-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-41-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-40-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-38-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-37-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-36-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-35-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-34-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-33-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-32-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-31-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-30-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-28-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-59-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-27-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-26-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-25-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-24-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-23-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-22-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-21-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-43-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-19-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-14-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-13-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-12-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-11-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-10-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-9-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-39-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-8-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-7-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-61-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-15-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-64-0x0000000000F50000-0x0000000000F57000-memory.dmp

          Filesize

          28KB

        • memory/3432-65-0x00007FFA56780000-0x00007FFA56790000-memory.dmp

          Filesize

          64KB

        • memory/3432-50-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-18-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-17-0x0000000140000000-0x000000014012C000-memory.dmp

          Filesize

          1.2MB

        • memory/3432-4-0x0000000002F10000-0x0000000002F11000-memory.dmp

          Filesize

          4KB

        • memory/3432-6-0x00007FFA553AA000-0x00007FFA553AB000-memory.dmp

          Filesize

          4KB

        • memory/3596-107-0x0000000140000000-0x000000014012D000-memory.dmp

          Filesize

          1.2MB

        • memory/3596-106-0x000001D69A540000-0x000001D69A547000-memory.dmp

          Filesize

          28KB