Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 19:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f8a0bdd28d844a8f4fab845d6f7b93bc_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
f8a0bdd28d844a8f4fab845d6f7b93bc_JaffaCakes118.dll
-
Size
188KB
-
MD5
f8a0bdd28d844a8f4fab845d6f7b93bc
-
SHA1
ed56ea0b818b139ff4b922f842abb75be0d68de6
-
SHA256
39e41d870d08b686402c0256b27514c9af9ac2f625b58c425060f80d7e26050a
-
SHA512
9c603af7e1e0c45ce39a1f7b067581c6a9c4a05735334eb90c6ca8f41b7b64b879d1351d98bda178efda0c88cbc2719bcf030a9744c12bbaf96238becfd46926
-
SSDEEP
3072:GA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoAo:GzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2952-1-0x00000000750D0000-0x0000000075100000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3056 2952 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2956 wrote to memory of 2952 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2952 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2952 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2952 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2952 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2952 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2952 2956 rundll32.exe rundll32.exe PID 2952 wrote to memory of 3056 2952 rundll32.exe WerFault.exe PID 2952 wrote to memory of 3056 2952 rundll32.exe WerFault.exe PID 2952 wrote to memory of 3056 2952 rundll32.exe WerFault.exe PID 2952 wrote to memory of 3056 2952 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8a0bdd28d844a8f4fab845d6f7b93bc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8a0bdd28d844a8f4fab845d6f7b93bc_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 3003⤵
- Program crash