Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 00:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f4a00bbfbd643b00d75487d1d6e36534_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f4a00bbfbd643b00d75487d1d6e36534_JaffaCakes118.dll
-
Size
188KB
-
MD5
f4a00bbfbd643b00d75487d1d6e36534
-
SHA1
dfa459dc8cc5b44b55b89617d0bb8cd03c8f93cb
-
SHA256
d6c202404f95832f3f7e5ea3d0dec6c551e2bb81864ee4b3a49488e820e1d61e
-
SHA512
23f1890ec2308adda239b1f7f51dd16bf2ae956c2f9b614be8f5d1380afaf9cd322efc15d01c4fcac0578610c246d8bcb11af853e9356170c9108bc617c1efb9
-
SSDEEP
3072:TA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAofo:TzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4660-1-0x0000000075420000-0x0000000075450000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3580 4660 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4964 wrote to memory of 4660 4964 rundll32.exe rundll32.exe PID 4964 wrote to memory of 4660 4964 rundll32.exe rundll32.exe PID 4964 wrote to memory of 4660 4964 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4a00bbfbd643b00d75487d1d6e36534_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4a00bbfbd643b00d75487d1d6e36534_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 6883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4660 -ip 46601⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵