Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 00:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e8d2331330a3ae321e50cb6574a05071_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
e8d2331330a3ae321e50cb6574a05071_JaffaCakes118.dll
-
Size
188KB
-
MD5
e8d2331330a3ae321e50cb6574a05071
-
SHA1
b2021b145bb6b60a7de29849d46d90d175998ce8
-
SHA256
a7807236bd5ed8340898d479ca8b3c8b332eb63f0515c0f7db44e58842b129cc
-
SHA512
7ea7c4938cf3f82c83bf739aea4bb58798d3f8155932db8f3977b0dc9c9da86e65e1d8035792cd42ea27e8a519efa133a2ff642cd54922fd75fe0b53940e3385
-
SSDEEP
3072:GA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoOo:GzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2192-0-0x0000000074C30000-0x0000000074C60000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1720 2192 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 360 wrote to memory of 2192 360 rundll32.exe rundll32.exe PID 360 wrote to memory of 2192 360 rundll32.exe rundll32.exe PID 360 wrote to memory of 2192 360 rundll32.exe rundll32.exe PID 360 wrote to memory of 2192 360 rundll32.exe rundll32.exe PID 360 wrote to memory of 2192 360 rundll32.exe rundll32.exe PID 360 wrote to memory of 2192 360 rundll32.exe rundll32.exe PID 360 wrote to memory of 2192 360 rundll32.exe rundll32.exe PID 2192 wrote to memory of 1720 2192 rundll32.exe WerFault.exe PID 2192 wrote to memory of 1720 2192 rundll32.exe WerFault.exe PID 2192 wrote to memory of 1720 2192 rundll32.exe WerFault.exe PID 2192 wrote to memory of 1720 2192 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8d2331330a3ae321e50cb6574a05071_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8d2331330a3ae321e50cb6574a05071_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 3003⤵
- Program crash