Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 11:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e757e13ecddbe864da3af5dc4f60d884_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e757e13ecddbe864da3af5dc4f60d884_JaffaCakes118.dll
-
Size
188KB
-
MD5
e757e13ecddbe864da3af5dc4f60d884
-
SHA1
c57bc71613aed71197dc056583e2354d59d89662
-
SHA256
9e41683d1143256df28a4be4cb848763f1be23f2f6819fbc4451383957c161d3
-
SHA512
7dd1f8b58d1480acaef24f91eb87e16f4cbeb3bcd48a0449583ff7bc62e22463d66cd608f6180a08b91482616cf99d747255f8f7a33c45625144715386b0f6bc
-
SSDEEP
3072:TA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoro:TzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2248-1-0x00000000746C0000-0x00000000746F0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2100 2248 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2008 wrote to memory of 2248 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2248 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2248 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2248 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2248 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2248 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2248 2008 rundll32.exe rundll32.exe PID 2248 wrote to memory of 2100 2248 rundll32.exe WerFault.exe PID 2248 wrote to memory of 2100 2248 rundll32.exe WerFault.exe PID 2248 wrote to memory of 2100 2248 rundll32.exe WerFault.exe PID 2248 wrote to memory of 2100 2248 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e757e13ecddbe864da3af5dc4f60d884_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e757e13ecddbe864da3af5dc4f60d884_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 3083⤵
- Program crash