Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2025 07:54

General

  • Target

    JaffaCakes118_1784eed86f9255db0efbd5ddbf4b2560.dll

  • Size

    1.2MB

  • MD5

    1784eed86f9255db0efbd5ddbf4b2560

  • SHA1

    21c51a0ba1ef68404534c414c1fd58f2c4f0825b

  • SHA256

    cdde0dfafa869cbf727ef47da712cf20a795006a434065252fa06fd4ab9506a5

  • SHA512

    cd5e93ef7b25c30a08f6c1febab3913b89542fbff0f1f4bca55bd54b0b43a6c63b2fa8f152777dfa8bd3236a3d52150f963abe26c58013c29941c6a29c1d46b4

  • SSDEEP

    12288:8VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1q:JfP7fWsK5z9A+WGAW+V5SB6Ct4bnbq

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1784eed86f9255db0efbd5ddbf4b2560.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2816
  • C:\Windows\system32\SystemPropertiesHardware.exe
    C:\Windows\system32\SystemPropertiesHardware.exe
    1⤵
      PID:3156
    • C:\Users\Admin\AppData\Local\XIl\SystemPropertiesHardware.exe
      C:\Users\Admin\AppData\Local\XIl\SystemPropertiesHardware.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2856
    • C:\Windows\system32\BitLockerWizardElev.exe
      C:\Windows\system32\BitLockerWizardElev.exe
      1⤵
        PID:2376
      • C:\Users\Admin\AppData\Local\pVA9\BitLockerWizardElev.exe
        C:\Users\Admin\AppData\Local\pVA9\BitLockerWizardElev.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:264
      • C:\Windows\system32\rdpinput.exe
        C:\Windows\system32\rdpinput.exe
        1⤵
          PID:5080
        • C:\Users\Admin\AppData\Local\CNFLw82\rdpinput.exe
          C:\Users\Admin\AppData\Local\CNFLw82\rdpinput.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3192

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\CNFLw82\WINSTA.dll

          Filesize

          1.2MB

          MD5

          90a911ccb74a3096cec3aed7f354e358

          SHA1

          368523cb96e286bb296fb947a10bdcb3abdb09b5

          SHA256

          9a8187e04d7c9c5b69dd7a1cc5fb5a0f5baa8acb16a96385433d4a02c4ec92ad

          SHA512

          a04742bb2fc61b78720dae9c320272a5b1a0f0928de5fbb0e5124c9f21a16d7e9bbdfc5085883f384b92fcd4accd37ef4c5bc2e734ecbc39c30a6362157bb5e7

        • C:\Users\Admin\AppData\Local\CNFLw82\rdpinput.exe

          Filesize

          180KB

          MD5

          bd99eeca92869f9a3084d689f335c734

          SHA1

          a2839f6038ea50a4456cd5c2a3ea003e7b77688c

          SHA256

          39bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143

          SHA512

          355433c3bbbaa3bcb849633d45713d8a7ac6f87a025732fbe83e259ec3a0cb4eabb18239df26609453f9fc6764c7276c5d0472f11cf12d15ef806aa7594d090e

        • C:\Users\Admin\AppData\Local\XIl\SYSDM.CPL

          Filesize

          1.2MB

          MD5

          47c89d05126c623811418b74c74ee1fa

          SHA1

          99c20cc207f0fe78495e9fa722187dc30e0e276f

          SHA256

          9d5898d8a9722f86784cbecd8e05c4b6afde83d53bb552c268890c51f0229e35

          SHA512

          56616fad1461db53c1ca64f699ff97f9386e68079b69ced3b62fbf50ea8b2e04193c9a46906fb6a5e96ededed7c52ed947600c59bf342075d43415bccd829c13

        • C:\Users\Admin\AppData\Local\XIl\SystemPropertiesHardware.exe

          Filesize

          82KB

          MD5

          bf5bc0d70a936890d38d2510ee07a2cd

          SHA1

          69d5971fd264d8128f5633db9003afef5fad8f10

          SHA256

          c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7

          SHA512

          0e129044777cbbf5ea995715159c50773c1818fc5e8faa5c827fd631b44c086b34dfdcbe174b105891ccc3882cc63a8664d189fb6a631d8f589de4e01a862f51

        • C:\Users\Admin\AppData\Local\pVA9\BitLockerWizardElev.exe

          Filesize

          100KB

          MD5

          8ac5a3a20cf18ae2308c64fd707eeb81

          SHA1

          31f2f0bdc2eb3e0d2a6cd626ea8ed71262865544

          SHA256

          803eb37617d450704766cb167dc9766e82102a94940a26a988ad26ab8be3f2f5

          SHA512

          85d0e28e4bffec709f26b2f0d20eb76373134af43bcaa70b97a03efa273b77dd4fbd4f6ee026774ce4029ab5a983aea057111efcd234ab1686a9bd0f7202748b

        • C:\Users\Admin\AppData\Local\pVA9\FVEWIZ.dll

          Filesize

          1.2MB

          MD5

          36d5dd9736de1e18b40798906439b408

          SHA1

          bb17157076edb114ee1c51073e686c2a6a7f9b0c

          SHA256

          86e683d7e2ddbb36602f6435ccd9e13174b7ac3c7066f192c8ef4a3b10c0b715

          SHA512

          028adec25fcc4d454a00a995bda6630986be3be4e9348da43b67d5e7fad7e388fadd747a431ce23661287117ae29d9389eb956a548176840bec9deced8e967f6

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Fkasxldymr.lnk

          Filesize

          1KB

          MD5

          9c183efed82721e2e2d8c03dfec22055

          SHA1

          f19c3a7e6bdf0ff65cc2ec7653ed2d50bd718aaf

          SHA256

          04a11a6a864b0818db78674ca99c6b44c0ce2c8ff34a9610115899e3b3b12c1a

          SHA512

          13be75b595b02f7b3521fe4422261f1b1ccb0798d505301b1adfb786e018409631cf84913c688b9aad065f56f01592c51aaf0a83fbaec2d022a282afad1299e3

        • memory/264-101-0x0000026483B50000-0x0000026483B57000-memory.dmp

          Filesize

          28KB

        • memory/264-108-0x0000000140000000-0x0000000140139000-memory.dmp

          Filesize

          1.2MB

        • memory/264-100-0x0000000140000000-0x0000000140139000-memory.dmp

          Filesize

          1.2MB

        • memory/2816-3-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/2816-4-0x000002AB2DDC0000-0x000002AB2DDC7000-memory.dmp

          Filesize

          28KB

        • memory/2816-0-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/2816-30-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/2856-87-0x0000000140000000-0x0000000140139000-memory.dmp

          Filesize

          1.2MB

        • memory/2856-88-0x0000015673030000-0x0000015673037000-memory.dmp

          Filesize

          28KB

        • memory/2856-82-0x0000000140000000-0x0000000140139000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-33-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-22-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-50-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-49-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-47-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-46-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-45-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-44-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-43-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-42-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-41-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-39-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-38-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-37-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-36-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-35-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-34-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-53-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-32-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-31-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-69-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-29-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-28-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-27-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-26-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-25-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-23-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-51-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-21-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-19-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-18-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-17-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-15-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-14-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-13-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-12-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-11-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-9-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-10-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-52-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-48-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-40-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-24-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-71-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-77-0x0000000001EA0000-0x0000000001EA7000-memory.dmp

          Filesize

          28KB

        • memory/3144-78-0x00007FFA32280000-0x00007FFA32290000-memory.dmp

          Filesize

          64KB

        • memory/3144-60-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-16-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-8-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3144-5-0x00000000025B0000-0x00000000025B1000-memory.dmp

          Filesize

          4KB

        • memory/3144-7-0x00007FFA3046A000-0x00007FFA3046B000-memory.dmp

          Filesize

          4KB

        • memory/3192-124-0x0000000140000000-0x000000014013A000-memory.dmp

          Filesize

          1.2MB

        • memory/3192-125-0x00000158F5110000-0x00000158F5117000-memory.dmp

          Filesize

          28KB