Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 12:29

General

  • Target

    JaffaCakes118_1b5fc75cf7f17eb8d9d318b771073b45.dll

  • Size

    1.4MB

  • MD5

    1b5fc75cf7f17eb8d9d318b771073b45

  • SHA1

    8c25138e7db9e384da66bcf7fdb1697ab9efafbc

  • SHA256

    82288b7e8104a0143320ded6d208837fdacbd5046c0a1e064297a7055b5b8f8e

  • SHA512

    15af9016735a827ca76c0c874641043d3782f9eb3c8c65f08cf37d007188a9af78bc32b526db164981dc6c750fbb751d58180a38636c6c94ebe1c8aa59dc512e

  • SSDEEP

    12288:LdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:JMIJxSDX3bqjhcfHk7MzH6z

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 8 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b5fc75cf7f17eb8d9d318b771073b45.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2092
  • C:\Windows\system32\dialer.exe
    C:\Windows\system32\dialer.exe
    1⤵
      PID:2212
    • C:\Users\Admin\AppData\Local\9NIRMmIk\dialer.exe
      C:\Users\Admin\AppData\Local\9NIRMmIk\dialer.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      PID:2816
    • C:\Windows\system32\sethc.exe
      C:\Windows\system32\sethc.exe
      1⤵
        PID:2800
      • C:\Users\Admin\AppData\Local\7k5YLQf\sethc.exe
        C:\Users\Admin\AppData\Local\7k5YLQf\sethc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2732
      • C:\Windows\system32\DWWIN.EXE
        C:\Windows\system32\DWWIN.EXE
        1⤵
          PID:1248
        • C:\Users\Admin\AppData\Local\Rx4ZgnmbB\DWWIN.EXE
          C:\Users\Admin\AppData\Local\Rx4ZgnmbB\DWWIN.EXE
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:956

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\7k5YLQf\sethc.exe

          Filesize

          272KB

          MD5

          3bcb70da9b5a2011e01e35ed29a3f3f3

          SHA1

          9daecb1ee5d7cbcf46ee154dd642fcd993723a9b

          SHA256

          dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5

          SHA512

          69d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df

        • C:\Users\Admin\AppData\Local\9NIRMmIk\TAPI32.dll

          Filesize

          1.4MB

          MD5

          7329f255dc0d7f92732c5254e5b4ab4d

          SHA1

          c81ddbbeca2022809afef14305c6260b15c1ddf5

          SHA256

          1fe59d3dce8c9a500f14381ff383432f80b5578db6f611a20d714bc45096d9c0

          SHA512

          f28d3403c7e5dc77b9ffb695630f2cb088d9d335134848850ad56d660d6c033087c8bcaa0ef03269f937d19fb3943751a86a7ed3822922365f104ec5bb95d87e

        • C:\Users\Admin\AppData\Local\9NIRMmIk\dialer.exe

          Filesize

          34KB

          MD5

          46523e17ee0f6837746924eda7e9bac9

          SHA1

          d6b2a9cc6bd3588fa9804ada5197afda6a9e034b

          SHA256

          23d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382

          SHA512

          c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a

        • C:\Users\Admin\AppData\Local\Rx4ZgnmbB\DWWIN.EXE

          Filesize

          149KB

          MD5

          25247e3c4e7a7a73baeea6c0008952b1

          SHA1

          8087adb7a71a696139ddc5c5abc1a84f817ab688

          SHA256

          c740497a7e58f7678e25b68b03573b4136a364464ee97c02ce5e0fe00cec7050

          SHA512

          bc27946894e7775f772ac882740430c8b9d3f37a573e2524207f7bb32f44d4a227cb1e9a555e118d68af7f1e129abd2ac5cabbcd8bbf3551c485bae05108324b

        • C:\Users\Admin\AppData\Local\Rx4ZgnmbB\wer.dll

          Filesize

          1.4MB

          MD5

          5d809a30e4a3d97304d3158d9f363512

          SHA1

          bd0ae277ab9fbd1804a35469d27df114bc036c48

          SHA256

          855be21a05605a7183f6622f7a85ff12c0c811aa9de74b95603ecb95f83f23f0

          SHA512

          30ed10e0ce0326b1216ebdb57fb3a1e2ffe2427bf8bdd2d53b0403e5f1dbab8d52b2e1eacc6b7a8ef6da4388af6c0fd8c4d556e591987737bb49f1ed7fc1778e

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Gwifj.lnk

          Filesize

          1KB

          MD5

          2da7bf2a2782fe65f7c342e0d92bbe5e

          SHA1

          4f95d834ecbcea63c0a74957a9bb050903c47b99

          SHA256

          66060ff6e48b2dfc3bf973a0736806bc2342d31a8480daee45a22ebe3f097f1f

          SHA512

          0dd352a9b41fa23af713c60083f39ea066ca5630876e96fb3a389540ecee545f89d8998556d7484945848b078706af1035c5ad810ec565e1b67ea2a467051011

        • \Users\Admin\AppData\Local\7k5YLQf\OLEACC.dll

          Filesize

          1.4MB

          MD5

          33dcddac5499e2e9495164c7eb1a9e70

          SHA1

          ded901c66bdc79e57f81fa48a4031345bbbe6f2e

          SHA256

          eacacc88fc33c007ecc04c66a6967d751067d6b6bf68fa501b0cf8678da6ebdb

          SHA512

          328f6fd4ed7370acb41766c85d3e437cf5c96c3965582fc50bef294cfcd7c0ab697c5bd670bfe935fb108adedcd45191fe3a2d2913fdf184bd5e891c647b03ef

        • memory/956-107-0x0000000000200000-0x0000000000207000-memory.dmp

          Filesize

          28KB

        • memory/1208-56-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-39-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-21-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-27-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-35-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-34-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-33-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-38-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-40-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-32-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-31-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-29-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-16-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-19-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-17-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-15-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-14-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-13-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-20-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-28-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-41-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-52-0x00000000773B0000-0x00000000773B2000-memory.dmp

          Filesize

          8KB

        • memory/1208-11-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-55-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-51-0x0000000077380000-0x0000000077382000-memory.dmp

          Filesize

          8KB

        • memory/1208-50-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-49-0x0000000002170000-0x0000000002177000-memory.dmp

          Filesize

          28KB

        • memory/1208-18-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-37-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-36-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-30-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-26-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-25-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-24-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-23-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-22-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-12-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-10-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-65-0x0000000077016000-0x0000000077017000-memory.dmp

          Filesize

          4KB

        • memory/1208-3-0x0000000077016000-0x0000000077017000-memory.dmp

          Filesize

          4KB

        • memory/1208-4-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

          Filesize

          4KB

        • memory/1208-8-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-7-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-9-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/1208-6-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/2092-64-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/2092-2-0x0000000000320000-0x0000000000327000-memory.dmp

          Filesize

          28KB

        • memory/2092-0-0x0000000140000000-0x0000000140160000-memory.dmp

          Filesize

          1.4MB

        • memory/2732-90-0x0000000140000000-0x0000000140161000-memory.dmp

          Filesize

          1.4MB

        • memory/2732-92-0x0000000000330000-0x0000000000337000-memory.dmp

          Filesize

          28KB

        • memory/2816-78-0x0000000140000000-0x0000000140162000-memory.dmp

          Filesize

          1.4MB

        • memory/2816-74-0x0000000140000000-0x0000000140162000-memory.dmp

          Filesize

          1.4MB

        • memory/2816-73-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB