Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 03:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e68fd3fd2d195c06caacc437e11bae0a_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e68fd3fd2d195c06caacc437e11bae0a_JaffaCakes118.dll
-
Size
188KB
-
MD5
e68fd3fd2d195c06caacc437e11bae0a
-
SHA1
211677659a26fcbb58ce9efe1668c0ba5f05297e
-
SHA256
05a921be55e7a8ffcaee51b59aa5a9dfeb93e584a6123994d9ebb2d53ca882c5
-
SHA512
ef9de2c9a1d04185849d97f2bd7029a9db697030ae3cef39f53635ce75df0e4696a1074a0fb8ff164ee07b69391409273a3a4917ef42022d3e23b51faf9e2b78
-
SSDEEP
3072:LA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoao:LzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1628-0-0x0000000074EF0000-0x0000000074F20000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2052 1628 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2280 wrote to memory of 1628 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 1628 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 1628 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 1628 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 1628 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 1628 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 1628 2280 rundll32.exe rundll32.exe PID 1628 wrote to memory of 2052 1628 rundll32.exe WerFault.exe PID 1628 wrote to memory of 2052 1628 rundll32.exe WerFault.exe PID 1628 wrote to memory of 2052 1628 rundll32.exe WerFault.exe PID 1628 wrote to memory of 2052 1628 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e68fd3fd2d195c06caacc437e11bae0a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e68fd3fd2d195c06caacc437e11bae0a_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 3003⤵
- Program crash
PID:2052