Analysis
-
max time kernel
73s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 19:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ebdfd39f4b9ab189cd32b271db4bb3ac_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
ebdfd39f4b9ab189cd32b271db4bb3ac_JaffaCakes118.dll
-
Size
175KB
-
MD5
ebdfd39f4b9ab189cd32b271db4bb3ac
-
SHA1
839ca7bf434c05541e2df56e1eab0819a5822b1d
-
SHA256
0f52e85eae79fb03bd9b391bc9753417cd066990a41251d385f55e2c9c7b4b53
-
SHA512
f050cf3506ba11bb06710590e050c7e18a50815d5401d065fa4c3732afae718a509dbe3cc2a14fa040f7555414f2a183eba841e63d4df8112f00fcc78842afbe
-
SSDEEP
3072:wXY5bY8XE+kkqh84cKcv4FinaLzL2rVQLOmpvNbTAvestOr18T:+RAkkk84e4wne2nmhFAve4O
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
45.79.33.48:443
139.162.202.74:5007
68.183.216.174:7443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/904-1-0x0000000075250000-0x0000000075280000-memory.dmp dridex_ldr behavioral2/memory/904-3-0x0000000075250000-0x0000000075280000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2620 wrote to memory of 904 2620 rundll32.exe 91 PID 2620 wrote to memory of 904 2620 rundll32.exe 91 PID 2620 wrote to memory of 904 2620 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebdfd39f4b9ab189cd32b271db4bb3ac_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebdfd39f4b9ab189cd32b271db4bb3ac_JaffaCakes118.dll,#12⤵
- Checks whether UAC is enabled
PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1324 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:5504