Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 10:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fc8b6d1b2fc9a6d039c345ae9d317c44_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
fc8b6d1b2fc9a6d039c345ae9d317c44_JaffaCakes118.dll
-
Size
188KB
-
MD5
fc8b6d1b2fc9a6d039c345ae9d317c44
-
SHA1
f48cf4fd6b8c1625a17cf0590ffaf941f7f2b5d6
-
SHA256
524cdcfcd1a56496698c0be5306a2272bcec58999bb1c98c6ed07f3470d1e581
-
SHA512
fe81e17e5fa63b5e0fd81352b3bbde2619065ce024bf04c00cbf66e2aa74c804f04a75be973148813505db98df48e9885c392b9f7aced00d830610674c3b9d53
-
SSDEEP
3072:6A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAojo:6zIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1760-0-0x0000000074710000-0x0000000074740000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2156 1760 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1288 wrote to memory of 1760 1288 rundll32.exe rundll32.exe PID 1288 wrote to memory of 1760 1288 rundll32.exe rundll32.exe PID 1288 wrote to memory of 1760 1288 rundll32.exe rundll32.exe PID 1288 wrote to memory of 1760 1288 rundll32.exe rundll32.exe PID 1288 wrote to memory of 1760 1288 rundll32.exe rundll32.exe PID 1288 wrote to memory of 1760 1288 rundll32.exe rundll32.exe PID 1288 wrote to memory of 1760 1288 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2156 1760 rundll32.exe WerFault.exe PID 1760 wrote to memory of 2156 1760 rundll32.exe WerFault.exe PID 1760 wrote to memory of 2156 1760 rundll32.exe WerFault.exe PID 1760 wrote to memory of 2156 1760 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc8b6d1b2fc9a6d039c345ae9d317c44_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc8b6d1b2fc9a6d039c345ae9d317c44_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 3083⤵
- Program crash
PID:2156