Analysis
-
max time kernel
91s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 23:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ec35ee8a8729f962e85dbbfa3cdd45a5_JaffaCakes118.dll
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ec35ee8a8729f962e85dbbfa3cdd45a5_JaffaCakes118.dll
-
Size
188KB
-
MD5
ec35ee8a8729f962e85dbbfa3cdd45a5
-
SHA1
a9b0637f05de8e889ba05a05b70f1f56297be542
-
SHA256
3fca540bb41b9f7cd1429e879a610e2def3a93799070d3831126e4c66873ac38
-
SHA512
cdffe8c279f34833ac8ffdb9d52d99a7a2494557446b3df337de2be502f16f4a52c42990b657bd0188fec5050b8d52c5ba1abb958e43eda93ae0a0bb44a412e7
-
SSDEEP
3072:WA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoSo:WzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4520-0-0x0000000075490000-0x00000000754C0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3740 4520 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4060 wrote to memory of 4520 4060 rundll32.exe rundll32.exe PID 4060 wrote to memory of 4520 4060 rundll32.exe rundll32.exe PID 4060 wrote to memory of 4520 4060 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec35ee8a8729f962e85dbbfa3cdd45a5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec35ee8a8729f962e85dbbfa3cdd45a5_JaffaCakes118.dll,#12⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 6883⤵
- Program crash
PID:3740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4520 -ip 45201⤵PID:2364