Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 10:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fc9792237dfe0e02d6774170266639a7_JaffaCakes118.dll
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
fc9792237dfe0e02d6774170266639a7_JaffaCakes118.dll
-
Size
188KB
-
MD5
fc9792237dfe0e02d6774170266639a7
-
SHA1
9917ef3e468806b435105b0768f5a2a9f62389b1
-
SHA256
0f9afffd1ce16ff8f1c1772cb7d76c3c627cd834852ac0f88783bddeb8f1d6f9
-
SHA512
253aa0097ad709d48dac8320ffa1ce11ddb69e8f57e3cd9610bb6f01a494d535a34d6f348135d68d6e98b13f59d75ba25797565565624493612e916154e0cf58
-
SSDEEP
3072:dH0uyjZqEpAK+Gf78TBdrXkTM5vhRg9Esf0DwvtyMpVnpA+z6tX8sxKViWt7dU:dUua/Pv7YNhRIEZDeXVpAxtMsxK
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/2436-0-0x0000000075850000-0x0000000075880000-memory.dmp dridex_ldr behavioral2/memory/2436-2-0x0000000075850000-0x0000000075880000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1924 2436 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2436 2604 rundll32.exe 86 PID 2604 wrote to memory of 2436 2604 rundll32.exe 86 PID 2604 wrote to memory of 2436 2604 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc9792237dfe0e02d6774170266639a7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc9792237dfe0e02d6774170266639a7_JaffaCakes118.dll,#12⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 6923⤵
- Program crash
PID:1924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2436 -ip 24361⤵PID:800