Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 12:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f1184527d37fd027483c84cc8ad51053_JaffaCakes118.dll
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f1184527d37fd027483c84cc8ad51053_JaffaCakes118.dll
-
Size
188KB
-
MD5
f1184527d37fd027483c84cc8ad51053
-
SHA1
bde6af4386a55d954fc79c4a3e07913422f89d75
-
SHA256
3dc334e6e4c26c1ead4b66942975b5175fca3a6eabfbf79be2973f9df9aaf289
-
SHA512
7478b87c243552c90242852fe61674715e247903b0e95022dd965e3766d5711611ac45b726865a6f5e384241e3251170765f3ff186b4127615ad43f5e918d08d
-
SSDEEP
3072:2A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoco:2zIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3024-1-0x00000000758E0000-0x0000000075910000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4372 3024 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2360 wrote to memory of 3024 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 3024 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 3024 2360 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1184527d37fd027483c84cc8ad51053_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1184527d37fd027483c84cc8ad51053_JaffaCakes118.dll,#12⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 6923⤵
- Program crash
PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3024 -ip 30241⤵PID:2260