Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 00:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f91e1c9c32e304fcc4d9a940274a9438_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
f91e1c9c32e304fcc4d9a940274a9438_JaffaCakes118.dll
-
Size
188KB
-
MD5
f91e1c9c32e304fcc4d9a940274a9438
-
SHA1
e5f6feccec02e9aadf924e8e84e04daa93b901d2
-
SHA256
5572995b5c80079e95a6853bac7d1824408469b04ea911c6f9337fb383e6bc00
-
SHA512
95e016ba982d111d438d12d13cac116c1dee0f2f88768c550ece72237a17562400f062f87689a37250bdaea1d9d5e047a89c71d918d1e366f0d187d247cb3b5b
-
SSDEEP
3072:yA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoFo:yzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2760-0-0x0000000074D70000-0x0000000074DA0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2980 2760 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2292 wrote to memory of 2760 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 2760 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 2760 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 2760 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 2760 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 2760 2292 rundll32.exe rundll32.exe PID 2292 wrote to memory of 2760 2292 rundll32.exe rundll32.exe PID 2760 wrote to memory of 2980 2760 rundll32.exe WerFault.exe PID 2760 wrote to memory of 2980 2760 rundll32.exe WerFault.exe PID 2760 wrote to memory of 2980 2760 rundll32.exe WerFault.exe PID 2760 wrote to memory of 2980 2760 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f91e1c9c32e304fcc4d9a940274a9438_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f91e1c9c32e304fcc4d9a940274a9438_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 3003⤵
- Program crash