Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 00:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e63d101a45580764256a272a8a6576bd_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
e63d101a45580764256a272a8a6576bd_JaffaCakes118.dll
-
Size
188KB
-
MD5
e63d101a45580764256a272a8a6576bd
-
SHA1
e4ead729412e4a4bff5b23e3b3b491da0761ba4b
-
SHA256
89e1e241ab61419232cac03da7a04ecd800944cccec2853d590d12531e301327
-
SHA512
0e4772b9c5838a2cc0efc06d26a25c68e834f3d6bd963d56f5bef54b88183d94df00ad2e968fa1e9faa6e17fff6999e8845ab359d9e38d8a32fdbd99586c3669
-
SSDEEP
3072:gA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoBo:gzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2000-0-0x0000000074990000-0x00000000749C0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2784 2000 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1948 wrote to memory of 2000 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 2000 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 2000 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 2000 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 2000 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 2000 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 2000 1948 rundll32.exe rundll32.exe PID 2000 wrote to memory of 2784 2000 rundll32.exe WerFault.exe PID 2000 wrote to memory of 2784 2000 rundll32.exe WerFault.exe PID 2000 wrote to memory of 2784 2000 rundll32.exe WerFault.exe PID 2000 wrote to memory of 2784 2000 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e63d101a45580764256a272a8a6576bd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e63d101a45580764256a272a8a6576bd_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 3003⤵
- Program crash