Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 10:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e253edffa6d565fe6b312d8deafdc059_JaffaCakes118.dll
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e253edffa6d565fe6b312d8deafdc059_JaffaCakes118.dll
-
Size
188KB
-
MD5
e253edffa6d565fe6b312d8deafdc059
-
SHA1
781fb0d155cdbd2c35db80498f3c9c681c4a9ca0
-
SHA256
4825ded9234fba9298f20dd54f6f2aaa378c995ad214eabfbb8825d888c3cec1
-
SHA512
ccbb95a15efa6024081573b0e53c9c6ec3a88d31cff9185f8d8c5ea3aa728ce494c291f78e6ea79fed74d7b27bd65e33825c0948c23b4ddcbcaaca3ba43a3ded
-
SSDEEP
3072:hA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoMo:hzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2392-0-0x0000000075770000-0x00000000757A0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4264 2392 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4888 wrote to memory of 2392 4888 rundll32.exe rundll32.exe PID 4888 wrote to memory of 2392 4888 rundll32.exe rundll32.exe PID 4888 wrote to memory of 2392 4888 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e253edffa6d565fe6b312d8deafdc059_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e253edffa6d565fe6b312d8deafdc059_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2392 -ip 23921⤵