Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 13:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f393919a715896639aefcdf8d3ecf450_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
f393919a715896639aefcdf8d3ecf450_JaffaCakes118.dll
-
Size
188KB
-
MD5
f393919a715896639aefcdf8d3ecf450
-
SHA1
c780817ecdd834a143a503e70c6a8de8c1badbee
-
SHA256
44d63447ae440e8b508e601a46bbb13db0fcb6aabd5a9af6f1e5140a6071830a
-
SHA512
f4f1305a5833ab07605ae859c8237f08d43d7eaafc2c9835fe3c856c02b91dad3c88eaafc470b41205117d68aa32b81f0fae7469c351c41394f37a96776f8ab6
-
SSDEEP
3072:jA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAowo:jzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1744-0-0x0000000074C60000-0x0000000074C90000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1840 1744 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1744 1952 rundll32.exe rundll32.exe PID 1744 wrote to memory of 1840 1744 rundll32.exe WerFault.exe PID 1744 wrote to memory of 1840 1744 rundll32.exe WerFault.exe PID 1744 wrote to memory of 1840 1744 rundll32.exe WerFault.exe PID 1744 wrote to memory of 1840 1744 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f393919a715896639aefcdf8d3ecf450_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f393919a715896639aefcdf8d3ecf450_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 3003⤵
- Program crash