Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 04:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f73f5def06c315a90f3665830bae8562_JaffaCakes118.dll
Resource
win7-20240215-en
4 signatures
150 seconds
General
-
Target
f73f5def06c315a90f3665830bae8562_JaffaCakes118.dll
-
Size
188KB
-
MD5
f73f5def06c315a90f3665830bae8562
-
SHA1
5c655534fb9d34c0ad9bbab970de703249155438
-
SHA256
2c629014f909b04c1e35a8edf07c64fcf5945246f23a95ff693c7f8f5336a066
-
SHA512
c1abccdfbfc7fcac6c938f458da733f399af77557c17cce706bd47d09b2e9f0ffe59e46dfcf1d84caa64da50debc35322b1b3071b62062680210ac31214773d0
-
SSDEEP
3072:2A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoao:2zIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1904-0-0x0000000075670000-0x00000000756A0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 500 1904 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1928 wrote to memory of 1904 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1904 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1904 1928 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f73f5def06c315a90f3665830bae8562_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f73f5def06c315a90f3665830bae8562_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1904 -ip 19041⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵