Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 17:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e7fdf04a0c4d7b5e1146f60a0ae47e29_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
e7fdf04a0c4d7b5e1146f60a0ae47e29_JaffaCakes118.dll
-
Size
188KB
-
MD5
e7fdf04a0c4d7b5e1146f60a0ae47e29
-
SHA1
170b930c9927c6e293dcd755512ed2d9cc0795c4
-
SHA256
8bf3ff4e1a15e78c670dc93e8b3ddf08d5745b920c4ea6697bb689a9b065ed40
-
SHA512
bc7eb481b51f1f08ef48608b50545f905d2d9f7dd3424bf6f1a5f01c6e950b0c0878abb14281b6982ffbbbb0e602db4f8e9dbedb210f3b71e4984fb541d6218d
-
SSDEEP
3072:CA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoOo:CzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2304-0-0x00000000749F0000-0x0000000074A20000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1728 2304 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2168 wrote to memory of 2304 2168 rundll32.exe rundll32.exe PID 2168 wrote to memory of 2304 2168 rundll32.exe rundll32.exe PID 2168 wrote to memory of 2304 2168 rundll32.exe rundll32.exe PID 2168 wrote to memory of 2304 2168 rundll32.exe rundll32.exe PID 2168 wrote to memory of 2304 2168 rundll32.exe rundll32.exe PID 2168 wrote to memory of 2304 2168 rundll32.exe rundll32.exe PID 2168 wrote to memory of 2304 2168 rundll32.exe rundll32.exe PID 2304 wrote to memory of 1728 2304 rundll32.exe WerFault.exe PID 2304 wrote to memory of 1728 2304 rundll32.exe WerFault.exe PID 2304 wrote to memory of 1728 2304 rundll32.exe WerFault.exe PID 2304 wrote to memory of 1728 2304 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7fdf04a0c4d7b5e1146f60a0ae47e29_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7fdf04a0c4d7b5e1146f60a0ae47e29_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 3003⤵
- Program crash