Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 10:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e4c1132365fa744a4d81c171145015a7_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e4c1132365fa744a4d81c171145015a7_JaffaCakes118.dll
-
Size
184KB
-
MD5
e4c1132365fa744a4d81c171145015a7
-
SHA1
33202325f1c19c485ec880daaa01b7d43283a043
-
SHA256
de19e11ad2fe7b2a49a71d46ed6df511a2d6ace19a579d7cc7febdbbd5905e21
-
SHA512
9bf604e8c578ae3ce9f88fc507d9cedcd7dfa371378496cd1441d04566912ae8c046a3daa83db4647c36a6bcfa9f32ef130ad4dff845d8e9e83f2d4a603ab80c
-
SSDEEP
3072:Lhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JfVQcY:L3fOeIv54W6SFKfc9me9v9/JfV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2612-0-0x00000000752F0000-0x0000000075320000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2644 2612 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2920 wrote to memory of 2612 2920 rundll32.exe rundll32.exe PID 2920 wrote to memory of 2612 2920 rundll32.exe rundll32.exe PID 2920 wrote to memory of 2612 2920 rundll32.exe rundll32.exe PID 2920 wrote to memory of 2612 2920 rundll32.exe rundll32.exe PID 2920 wrote to memory of 2612 2920 rundll32.exe rundll32.exe PID 2920 wrote to memory of 2612 2920 rundll32.exe rundll32.exe PID 2920 wrote to memory of 2612 2920 rundll32.exe rundll32.exe PID 2612 wrote to memory of 2644 2612 rundll32.exe WerFault.exe PID 2612 wrote to memory of 2644 2612 rundll32.exe WerFault.exe PID 2612 wrote to memory of 2644 2612 rundll32.exe WerFault.exe PID 2612 wrote to memory of 2644 2612 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4c1132365fa744a4d81c171145015a7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4c1132365fa744a4d81c171145015a7_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2883⤵
- Program crash