Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 17:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
eb92392449c6e4de96bba553c5c2312f_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
eb92392449c6e4de96bba553c5c2312f_JaffaCakes118.dll
-
Size
188KB
-
MD5
eb92392449c6e4de96bba553c5c2312f
-
SHA1
1514d6dc0a0b09b11160ffd664c9160b79937d0c
-
SHA256
8d591405f8e59527124d0f7d01c5a7dfdfee31e4b01fb8cda57eb1b71b7a47d2
-
SHA512
ef0187ff20c847658b727bd334543591626331478e00d219b8b0ebb9380aba9cb497a1e61d2bb187eddcc52229567f32cc1563e3f4d5846e3a4c5108a8a932c2
-
SSDEEP
3072:LA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo0o:LzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1620-0-0x0000000074990000-0x00000000749C0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2468 1620 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2188 wrote to memory of 1620 2188 rundll32.exe rundll32.exe PID 2188 wrote to memory of 1620 2188 rundll32.exe rundll32.exe PID 2188 wrote to memory of 1620 2188 rundll32.exe rundll32.exe PID 2188 wrote to memory of 1620 2188 rundll32.exe rundll32.exe PID 2188 wrote to memory of 1620 2188 rundll32.exe rundll32.exe PID 2188 wrote to memory of 1620 2188 rundll32.exe rundll32.exe PID 2188 wrote to memory of 1620 2188 rundll32.exe rundll32.exe PID 1620 wrote to memory of 2468 1620 rundll32.exe WerFault.exe PID 1620 wrote to memory of 2468 1620 rundll32.exe WerFault.exe PID 1620 wrote to memory of 2468 1620 rundll32.exe WerFault.exe PID 1620 wrote to memory of 2468 1620 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb92392449c6e4de96bba553c5c2312f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb92392449c6e4de96bba553c5c2312f_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 3003⤵
- Program crash
PID:2468