Analysis
-
max time kernel
91s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 15:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e2d31df2d0137381c95b0d3b0a3da14c_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e2d31df2d0137381c95b0d3b0a3da14c_JaffaCakes118.dll
-
Size
188KB
-
MD5
e2d31df2d0137381c95b0d3b0a3da14c
-
SHA1
d50ca78b28b9e937dbf1d049a7008764de89412e
-
SHA256
ce5b3262a16d03ba7cb7d48148ca5cd0f398097fd4aa58c6ebf23f95ed99192d
-
SHA512
c5cef75640ed8841cb52cc8802cce0ab8f150cc3f23d94eafdc16e268fa9f4e21757f7ee27bcc292053d9b2c29c4b3dca01040bb325cdceab27f7a5855c43fea
-
SSDEEP
3072:7A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoXo:7zIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1812-0-0x0000000075770000-0x00000000757A0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4164 1812 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5044 wrote to memory of 1812 5044 rundll32.exe rundll32.exe PID 5044 wrote to memory of 1812 5044 rundll32.exe rundll32.exe PID 5044 wrote to memory of 1812 5044 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2d31df2d0137381c95b0d3b0a3da14c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2d31df2d0137381c95b0d3b0a3da14c_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1812 -ip 18121⤵