Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 14:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f14c53b999e59c4300d2e76c44eb70d6_JaffaCakes118.dll
Resource
win7-20240319-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f14c53b999e59c4300d2e76c44eb70d6_JaffaCakes118.dll
-
Size
184KB
-
MD5
f14c53b999e59c4300d2e76c44eb70d6
-
SHA1
52af964118e3b069bf2d6aa166a1bb7df38c441e
-
SHA256
97782aeb7fefc673ab2ead6e96a6c505164214d7f327e1ded20b33435750dcb7
-
SHA512
4629d898bb136a89adbeb2d30512d7f9657c7db6a03dbe84bb79eab4cfb772b9e62189e646228bb0dfa883d4b83bf84ae2535c472206fda7937f7531678cd5fc
-
SSDEEP
3072:La3FHV3GsUEK4BRSjhvn0WUqqgfkNzQHAVCKdfzl5hL+kz:L8dt3+0TqqgqNcef1L+k
Malware Config
Extracted
Family
dridex
Botnet
22202
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/4296-0-0x0000000075030000-0x0000000075060000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 876 4296 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4296 1484 rundll32.exe 86 PID 1484 wrote to memory of 4296 1484 rundll32.exe 86 PID 1484 wrote to memory of 4296 1484 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f14c53b999e59c4300d2e76c44eb70d6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f14c53b999e59c4300d2e76c44eb70d6_JaffaCakes118.dll,#12⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 6683⤵
- Program crash
PID:876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4296 -ip 42961⤵PID:1496