Analysis
-
max time kernel
140s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 00:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ec51462a4db6ab68ee104455908ec9d9_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ec51462a4db6ab68ee104455908ec9d9_JaffaCakes118.dll
-
Size
188KB
-
MD5
ec51462a4db6ab68ee104455908ec9d9
-
SHA1
38909643c45aa41e8b263d3c2079488af1f100ce
-
SHA256
39159efd9985beb6915a9fcfba94886aa0b61b189c9baf8b023a1774f013cd93
-
SHA512
a0442c6732f4b570b93149a5498511f72af33a3906fbd2994dd4a9f7f09d99a2238242b1b70d2aac2d4ae9dfa0522e1cce0764883a4ad201aa18490d9b724bb1
-
SSDEEP
3072:YA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo/o:YzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/3472-0-0x0000000074E70000-0x0000000074EA0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1808 3472 WerFault.exe 95 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 320 wrote to memory of 3472 320 rundll32.exe 95 PID 320 wrote to memory of 3472 320 rundll32.exe 95 PID 320 wrote to memory of 3472 320 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec51462a4db6ab68ee104455908ec9d9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec51462a4db6ab68ee104455908ec9d9_JaffaCakes118.dll,#12⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 6923⤵
- Program crash
PID:1808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3472 -ip 34721⤵PID:4964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2228,i,8155065313278028490,17854605419281052753,262144 --variations-seed-version /prefetch:81⤵PID:4560