Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 15:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e5369d444ed023cb1f7a57c848e2b1ad_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e5369d444ed023cb1f7a57c848e2b1ad_JaffaCakes118.dll
-
Size
188KB
-
MD5
e5369d444ed023cb1f7a57c848e2b1ad
-
SHA1
503c5b74b0d464a2c759cd7792c0f658e0f663be
-
SHA256
e0d857a4dcaa6e3cbb10e3742be1be37fab0258b88febe739fd3cc10667eea35
-
SHA512
95cff6ffb4647d545fdf320bb2a1f679962b9931a6a6324cb1ca2b1e74f088e93b010362037a452d603d7ada8fc3322710348b3832c02bdcb79dc9696ab07f0a
-
SSDEEP
3072:hA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoro:hzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1708-0-0x0000000074990000-0x00000000749C0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3004 1708 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2208 wrote to memory of 1708 2208 rundll32.exe rundll32.exe PID 2208 wrote to memory of 1708 2208 rundll32.exe rundll32.exe PID 2208 wrote to memory of 1708 2208 rundll32.exe rundll32.exe PID 2208 wrote to memory of 1708 2208 rundll32.exe rundll32.exe PID 2208 wrote to memory of 1708 2208 rundll32.exe rundll32.exe PID 2208 wrote to memory of 1708 2208 rundll32.exe rundll32.exe PID 2208 wrote to memory of 1708 2208 rundll32.exe rundll32.exe PID 1708 wrote to memory of 3004 1708 rundll32.exe WerFault.exe PID 1708 wrote to memory of 3004 1708 rundll32.exe WerFault.exe PID 1708 wrote to memory of 3004 1708 rundll32.exe WerFault.exe PID 1708 wrote to memory of 3004 1708 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5369d444ed023cb1f7a57c848e2b1ad_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5369d444ed023cb1f7a57c848e2b1ad_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 3083⤵
- Program crash