Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 07:54

General

  • Target

    JaffaCakes118_1784eed86f9255db0efbd5ddbf4b2560.dll

  • Size

    1.2MB

  • MD5

    1784eed86f9255db0efbd5ddbf4b2560

  • SHA1

    21c51a0ba1ef68404534c414c1fd58f2c4f0825b

  • SHA256

    cdde0dfafa869cbf727ef47da712cf20a795006a434065252fa06fd4ab9506a5

  • SHA512

    cd5e93ef7b25c30a08f6c1febab3913b89542fbff0f1f4bca55bd54b0b43a6c63b2fa8f152777dfa8bd3236a3d52150f963abe26c58013c29941c6a29c1d46b4

  • SSDEEP

    12288:8VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1q:JfP7fWsK5z9A+WGAW+V5SB6Ct4bnbq

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1784eed86f9255db0efbd5ddbf4b2560.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1548
  • C:\Windows\system32\msdtc.exe
    C:\Windows\system32\msdtc.exe
    1⤵
      PID:2552
    • C:\Users\Admin\AppData\Local\d6pUW43rL\msdtc.exe
      C:\Users\Admin\AppData\Local\d6pUW43rL\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2608
    • C:\Windows\system32\dccw.exe
      C:\Windows\system32\dccw.exe
      1⤵
        PID:1112
      • C:\Users\Admin\AppData\Local\f79AkzLC\dccw.exe
        C:\Users\Admin\AppData\Local\f79AkzLC\dccw.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1840
      • C:\Windows\system32\OptionalFeatures.exe
        C:\Windows\system32\OptionalFeatures.exe
        1⤵
          PID:896
        • C:\Users\Admin\AppData\Local\Gpo4Mpa5t\OptionalFeatures.exe
          C:\Users\Admin\AppData\Local\Gpo4Mpa5t\OptionalFeatures.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1948

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Gpo4Mpa5t\appwiz.cpl

          Filesize

          1.2MB

          MD5

          d87620929616a53672ea3b6fe46449bc

          SHA1

          d22c7a905ac5281d532c6811bef5df4c0f3ea785

          SHA256

          0261d60a32432ebd3e3d95f9bbe06441c68261c926c2fdf1a7f5b069aa8f66a4

          SHA512

          161d05e57fba1b1727f5fa6ac9b4f1342c780d26e266f878fe8acc31115cbb08702f5a765d1d65958a179c304396046e5d1ccff0242c59df894ce31194bdc241

        • C:\Users\Admin\AppData\Local\d6pUW43rL\VERSION.dll

          Filesize

          1.2MB

          MD5

          1cdbb68bf0c5d5ecb5c5c1ebef48b0f7

          SHA1

          23607874ed9e0b0ea9e8199f8e1839428bf11469

          SHA256

          5d3344e385504de372ea3ef7e7d985f9202c63d19ef926b644a51c636e224396

          SHA512

          a364f408653b7888fbb0702f6cb95e7e3ade6fc5de9e9b86ac2ab8ab162e0e5f53d583824f22d05f6aae32f3ea355246df8f4d395689c4f4a0a6c08ad67b1540

        • C:\Users\Admin\AppData\Local\d6pUW43rL\msdtc.exe

          Filesize

          138KB

          MD5

          de0ece52236cfa3ed2dbfc03f28253a8

          SHA1

          84bbd2495c1809fcd19b535d41114e4fb101466c

          SHA256

          2fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3

          SHA512

          69386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3

        • C:\Users\Admin\AppData\Local\f79AkzLC\mscms.dll

          Filesize

          1.2MB

          MD5

          bbf750ca62550379f93b28f0912614c5

          SHA1

          6072e908befd7b5e96e900b46cddbd6f7dd0c2ca

          SHA256

          5ae64ac3da30b6f6b0f3acf1b1790e3c8d1ebb41f143816178b9c6628a815a8e

          SHA512

          0d70272bcb3b327651c4c0c7fabcc24480d866e830452cb8202d9ae4edefb25f486d1880230fbe98c4988b8b1e3794fde61324f5f4019eae7d4f7b56b0f516b7

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Yjafzwirjcl.lnk

          Filesize

          1KB

          MD5

          33031d2942806641bb3b407eea4143d5

          SHA1

          114fb55b92a52e44a7162016f77c3b68b3731e1a

          SHA256

          43aa25c9ee140d4cbaf7413e68f68c6626a5d3d88733005a8f4982956f38569e

          SHA512

          b27cc5bbf702733b8afba58340dcb5d4b0739d0e85a8d7424cbf769853e2dd04b0d3849d6770b6625b4c28da04907e4ce98bf48f106106543e11e3312c637b37

        • \Users\Admin\AppData\Local\Gpo4Mpa5t\OptionalFeatures.exe

          Filesize

          95KB

          MD5

          eae7af6084667c8f05412ddf096167fc

          SHA1

          0dbe8aba001447030e48e8ad5466fd23481e6140

          SHA256

          01feebd3aca961f31ba4eac45347b105d1c5772627b08f5538047721b61ff9bc

          SHA512

          172a8accaa35a6c9f86713a330c5899dfeeffe3b43413a3d276fc16d45cd62ed9237aa6bff29cc60a2022fba8dcc156959723c041df4b7463436a3bdabef2a9d

        • \Users\Admin\AppData\Local\f79AkzLC\dccw.exe

          Filesize

          861KB

          MD5

          a46cee731351eb4146db8e8a63a5c520

          SHA1

          8ea441e4a77642e12987ac842b36034230edd731

          SHA256

          283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5

          SHA512

          3573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc

        • memory/1212-43-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-40-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-39-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-15-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-38-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-46-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-16-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-17-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-18-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-19-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-23-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-28-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-52-0x0000000002500000-0x0000000002507000-memory.dmp

          Filesize

          28KB

        • memory/1212-61-0x0000000077970000-0x0000000077972000-memory.dmp

          Filesize

          8KB

        • memory/1212-64-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-67-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-60-0x0000000077811000-0x0000000077812000-memory.dmp

          Filesize

          4KB

        • memory/1212-59-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-51-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-50-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-49-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-48-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-47-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-45-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-37-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-4-0x0000000077706000-0x0000000077707000-memory.dmp

          Filesize

          4KB

        • memory/1212-42-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-41-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-32-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-14-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-44-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-36-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-35-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-34-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-33-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-31-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-13-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-30-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-29-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-27-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-26-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-25-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-24-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-22-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-21-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-20-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-12-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-10-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-9-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-5-0x0000000002520000-0x0000000002521000-memory.dmp

          Filesize

          4KB

        • memory/1212-135-0x0000000077706000-0x0000000077707000-memory.dmp

          Filesize

          4KB

        • memory/1212-7-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1212-8-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1548-11-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1548-1-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/1548-0-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/1840-104-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB

        • memory/1948-120-0x0000000000510000-0x0000000000517000-memory.dmp

          Filesize

          28KB