Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 09:02

General

  • Target

    JaffaCakes118_63fbef9c63dc9858707e03078f23f1ce.dll

  • Size

    2.4MB

  • MD5

    63fbef9c63dc9858707e03078f23f1ce

  • SHA1

    3a3aa0a1c6663551ee8e05fc2e6b17942fa83b96

  • SHA256

    11066c2e0a1b0fe58bc9584918054340aa58179a79a3c8c6da49c63801d8ff2a

  • SHA512

    e812c268e67ee8eeb46d6d8b50ca00c26e8db4784f99c15edd083b3583d999a1e65ffd46d7af87069d854b62edc956a26fe5ffd80d295efb2dd5126d6ed56956

  • SSDEEP

    12288:tVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:0fP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63fbef9c63dc9858707e03078f23f1ce.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1096
  • C:\Windows\system32\ApplySettingsTemplateCatalog.exe
    C:\Windows\system32\ApplySettingsTemplateCatalog.exe
    1⤵
      PID:2676
    • C:\Users\Admin\AppData\Local\lIWVOCTZ\ApplySettingsTemplateCatalog.exe
      C:\Users\Admin\AppData\Local\lIWVOCTZ\ApplySettingsTemplateCatalog.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3408
    • C:\Windows\system32\AtBroker.exe
      C:\Windows\system32\AtBroker.exe
      1⤵
        PID:2408
      • C:\Users\Admin\AppData\Local\AZqXZ\AtBroker.exe
        C:\Users\Admin\AppData\Local\AZqXZ\AtBroker.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1428
      • C:\Windows\system32\WFS.exe
        C:\Windows\system32\WFS.exe
        1⤵
          PID:4896
        • C:\Users\Admin\AppData\Local\wWHZ\WFS.exe
          C:\Users\Admin\AppData\Local\wWHZ\WFS.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1048

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\AZqXZ\AtBroker.exe

          Filesize

          90KB

          MD5

          30076e434a015bdf4c136e09351882cc

          SHA1

          584c958a35e23083a0861421357405afd26d9a0c

          SHA256

          ae7b1e298a6e38f0a3428151bfc5565ede50a8d98dafaa147b13cf89c61f2ddd

          SHA512

          675e310c2455acf9220735f34fa527afe87dac691e89cc0edc3c4659147e9fd223f96b7a3beea532047aa0ebc58880a7010343019a50aa73ce69a038e3592024

        • C:\Users\Admin\AppData\Local\AZqXZ\UxTheme.dll

          Filesize

          2.4MB

          MD5

          06eceee83689db16956efe8ea3e313a2

          SHA1

          6e2124c1bc9c1ecee408931a3051341df84afd04

          SHA256

          4a76eacb082190e63028dca1ccefdab26fa656ebc429cbea0deffbcaa3ec8318

          SHA512

          95a20cee6f63660499ef30ca2c41a33ed80f6d1d7f390c8efd27c76f8425b909de7702dea9d44e5d1cab8c1fa52dbef1418ddf3439672c6a5be3da9d3a037198

        • C:\Users\Admin\AppData\Local\lIWVOCTZ\ACTIVEDS.dll

          Filesize

          2.4MB

          MD5

          6931831a701d1102cd1ffaa3b2336586

          SHA1

          64b42741077e1581af5ec9ee0e40d0f46e7ff722

          SHA256

          ea0103f951ccb1f555911b4ef208f423b2d23048873e3c633c6df6e3c0ba0985

          SHA512

          e3e4e7d1753c4ff7e830102938c29d18efd700e06fcf9bf519d029bd5571cf58d5003a1c226a047a4818e80f4335f5270d2ef6992f2d8cbf84026b1170b287c7

        • C:\Users\Admin\AppData\Local\lIWVOCTZ\ApplySettingsTemplateCatalog.exe

          Filesize

          1.1MB

          MD5

          13af41b1c1c53c7360cd582a82ec2093

          SHA1

          7425f893d1245e351483ab4a20a5f59d114df4e1

          SHA256

          a462f29efaaa3c30411e76f32608a2ba5b7d21af3b9804e5dda99e342ba8c429

          SHA512

          c7c82acef623d964c520f1a458dbfe34099981de0b781fb56e14b1f82632e3a8437db6434e7c20988aa3b39efde47aab8d188e80845e841a13e74b079285706a

        • C:\Users\Admin\AppData\Local\wWHZ\UxTheme.dll

          Filesize

          2.4MB

          MD5

          3dc5ef63f6e2df851b933c459242e64f

          SHA1

          c597159a84dc93e3d47c13d7b454ad69be8138a4

          SHA256

          accdf6f22aee20c9db6bf9c3bcb226538141e11530fc7af59817416e669017d2

          SHA512

          ca89059565cf42cceebcda0c4ea9c7cf21fcdf39e6d619c7508f649e1ef81cab4fa4b7dfea8418bd27b91d8433bbdbc9b69e0619e56f262a7b04ca40bf316938

        • C:\Users\Admin\AppData\Local\wWHZ\WFS.exe

          Filesize

          944KB

          MD5

          3cbc8d0f65e3db6c76c119ed7c2ffd85

          SHA1

          e74f794d86196e3bbb852522479946cceeed7e01

          SHA256

          e23e4182efe7ed61aaf369696e1ce304c3818df33d1663872b6d3c75499d81f4

          SHA512

          26ae5845a804b9eb752078f1ffa80a476648a8a9508b4f7ba56c94acd4198f3ba59c77add4feb7e0420070222af56521ca5f6334f466d5db272c816930513f0a

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Eswctkc.lnk

          Filesize

          1KB

          MD5

          fa22f4d2e88d82c83637925b01cf0c46

          SHA1

          501d50766cb37d9d077ee59ae69d9bf10ef4d666

          SHA256

          a81982f86aa2d90a9b96fcf2e3d1fcdafa0fb22bde2b4ba5c0f2192f0a23c601

          SHA512

          0099daf8ea924c788514248ee58677e89a931573f5f1efbe5c0869d9f853db3a81f26f0e0c3b8f6986ad981311b2a5e7784b86384f1e75f5cb4e7e55589c09a0

        • memory/1096-0-0x0000000000680000-0x0000000000687000-memory.dmp

          Filesize

          28KB

        • memory/1096-2-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/1096-15-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/1428-116-0x0000021777480000-0x0000021777487000-memory.dmp

          Filesize

          28KB

        • memory/3408-99-0x00000148D6A80000-0x00000148D6A87000-memory.dmp

          Filesize

          28KB

        • memory/3560-37-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-27-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-63-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-62-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-60-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-59-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-58-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-56-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-55-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-54-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-53-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-52-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-51-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-50-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-49-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-48-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-46-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-45-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-44-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-43-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-42-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-40-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-39-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-38-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-92-0x00007FFC71840000-0x00007FFC71850000-memory.dmp

          Filesize

          64KB

        • memory/3560-36-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-35-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-33-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-32-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-30-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-29-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-91-0x00000000010C0000-0x00000000010C7000-memory.dmp

          Filesize

          28KB

        • memory/3560-24-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-23-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-22-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-21-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-19-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-20-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-18-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-17-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-14-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-13-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-12-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-11-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-10-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-9-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-61-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-57-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-47-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-41-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-34-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-31-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-28-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-26-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-25-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-16-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-65-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-64-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-7-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB

        • memory/3560-5-0x00007FFC7168A000-0x00007FFC7168B000-memory.dmp

          Filesize

          4KB

        • memory/3560-4-0x0000000001100000-0x0000000001101000-memory.dmp

          Filesize

          4KB

        • memory/3560-8-0x0000000140000000-0x0000000140272000-memory.dmp

          Filesize

          2.4MB