Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 20:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e5c7233e5dd8f21b824fdc705cff0dd9_JaffaCakes118.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e5c7233e5dd8f21b824fdc705cff0dd9_JaffaCakes118.dll
-
Size
188KB
-
MD5
e5c7233e5dd8f21b824fdc705cff0dd9
-
SHA1
95cacecbe72ee2c8d89fbf95bf96f4c67b669ba1
-
SHA256
8c4a04be9516e253bebf312212ccc4385f602bc93a893b099f8d016731b8d325
-
SHA512
311bf3860b7f42f3c3397e63de987975864a48dff02c66586a92422147e2c2fcc2a14130cfc358a12b4533341dac55af7599d71a7b05e49971273f5f1c75ac54
-
SSDEEP
3072:DA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAovo:DzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4740-0-0x0000000074DD0000-0x0000000074E00000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 452 4740 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3860 wrote to memory of 4740 3860 rundll32.exe rundll32.exe PID 3860 wrote to memory of 4740 3860 rundll32.exe rundll32.exe PID 3860 wrote to memory of 4740 3860 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5c7233e5dd8f21b824fdc705cff0dd9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5c7233e5dd8f21b824fdc705cff0dd9_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵