Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 22:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f48262fbfc5486fb9b7788ad5a68f9bb_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f48262fbfc5486fb9b7788ad5a68f9bb_JaffaCakes118.dll
-
Size
188KB
-
MD5
f48262fbfc5486fb9b7788ad5a68f9bb
-
SHA1
7f04a15f28925960d55804b8769d22517afb4133
-
SHA256
98f39070de6dbff083881c6cd6d5cb5e7cefeb6d59c62fdc2bebbfae935d457f
-
SHA512
18e6095df88ee32963ae77eae9d6a9170fc7119c9da5c6f00e92af09df1ae83ed5ebe62f29d1976220c8137b221fcd325654cf84233e1ee6bd0638a28af35264
-
SSDEEP
3072:JA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoQo:JzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2900-0-0x00000000751E0000-0x0000000075210000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3624 2900 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4148 wrote to memory of 2900 4148 rundll32.exe rundll32.exe PID 4148 wrote to memory of 2900 4148 rundll32.exe rundll32.exe PID 4148 wrote to memory of 2900 4148 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f48262fbfc5486fb9b7788ad5a68f9bb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f48262fbfc5486fb9b7788ad5a68f9bb_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2900 -ip 29001⤵