Analysis
-
max time kernel
110s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 00:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e63d101a45580764256a272a8a6576bd_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
e63d101a45580764256a272a8a6576bd_JaffaCakes118.dll
-
Size
188KB
-
MD5
e63d101a45580764256a272a8a6576bd
-
SHA1
e4ead729412e4a4bff5b23e3b3b491da0761ba4b
-
SHA256
89e1e241ab61419232cac03da7a04ecd800944cccec2853d590d12531e301327
-
SHA512
0e4772b9c5838a2cc0efc06d26a25c68e834f3d6bd963d56f5bef54b88183d94df00ad2e968fa1e9faa6e17fff6999e8845ab359d9e38d8a32fdbd99586c3669
-
SSDEEP
3072:gA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoBo:gzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3200-0-0x0000000074DA0000-0x0000000074DD0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4192 3200 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4412 wrote to memory of 3200 4412 rundll32.exe rundll32.exe PID 4412 wrote to memory of 3200 4412 rundll32.exe rundll32.exe PID 4412 wrote to memory of 3200 4412 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e63d101a45580764256a272a8a6576bd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e63d101a45580764256a272a8a6576bd_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3200 -ip 32001⤵