Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 12:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f5c5b3796a6a09ad95f677a6abc8d7ac_JaffaCakes118.dll
Resource
win7-20240319-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f5c5b3796a6a09ad95f677a6abc8d7ac_JaffaCakes118.dll
-
Size
188KB
-
MD5
f5c5b3796a6a09ad95f677a6abc8d7ac
-
SHA1
2c8b5db1f84c3a965564edbd5fc8819ad58a0b89
-
SHA256
522b0aba30c6d33ff4e6edfc04f417e91ec5ee3c37e84c21da5728218cde0453
-
SHA512
ce09cadbdd73d96907d9bf3cbceb3999462907ecbe2bbec8417381af410310dd8395accc019e6d405006d1f596e156bb28476f7f7f456da52366943d74a5d37e
-
SSDEEP
3072:QA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo5o:QzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1208-0-0x00000000750B0000-0x00000000750E0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2476 1208 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1148 wrote to memory of 1208 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1208 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1208 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1208 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1208 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1208 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1208 1148 rundll32.exe rundll32.exe PID 1208 wrote to memory of 2476 1208 rundll32.exe WerFault.exe PID 1208 wrote to memory of 2476 1208 rundll32.exe WerFault.exe PID 1208 wrote to memory of 2476 1208 rundll32.exe WerFault.exe PID 1208 wrote to memory of 2476 1208 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5c5b3796a6a09ad95f677a6abc8d7ac_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5c5b3796a6a09ad95f677a6abc8d7ac_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 3083⤵
- Program crash
PID:2476
-
-