Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 09:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f5833c6338815d52faa9f3fb58b43a75_JaffaCakes118.dll
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f5833c6338815d52faa9f3fb58b43a75_JaffaCakes118.dll
-
Size
184KB
-
MD5
f5833c6338815d52faa9f3fb58b43a75
-
SHA1
692583d206ad0ebf553b7ef3b7956194a6bbaace
-
SHA256
e880ced680f9d2fce2a9358996258938157477cf8a253ced4bf166f60d591a2a
-
SHA512
592969d82be1cf92108a11af9f2502a9fd043ac5768bae349a60ea1a028ef7bfd666bbe498e1daa540760fec596987804a33debd10094027ea1778c157e1628c
-
SSDEEP
3072:dDHMD9LnP1KxPqM8/1xYTCKJJ+xpm2s7E7jnR1VzGQiEFMFbsvQ:lMhP1cq7/16CT9jnR1Vz7iW
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
137.74.112.43:443
216.108.227.55:6225
94.177.176.51:5723
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3776-0-0x0000000075290000-0x00000000752C0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1388 3776 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4496 wrote to memory of 3776 4496 rundll32.exe rundll32.exe PID 4496 wrote to memory of 3776 4496 rundll32.exe rundll32.exe PID 4496 wrote to memory of 3776 4496 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5833c6338815d52faa9f3fb58b43a75_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5833c6338815d52faa9f3fb58b43a75_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 6123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3776 -ip 37761⤵