Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 12:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ff547c3d4672758597a0b6051771ff7a_JaffaCakes118.dll
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ff547c3d4672758597a0b6051771ff7a_JaffaCakes118.dll
-
Size
188KB
-
MD5
ff547c3d4672758597a0b6051771ff7a
-
SHA1
18f6aaa3cd39acec2b8510b2c9dba82667927989
-
SHA256
98ba750767903db60612369c2dd19759ab9e7c47affa9ee5fbeaa8a5c6e4bca5
-
SHA512
404d64d0da818a60d36f69186da706b03708bf83268b6e553a4f8b7470b36c3e7cedc9df58625b711c9807e7c5b9e26890892c30a8f936515420df1674eb7834
-
SSDEEP
3072:GA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoZo:GzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/232-0-0x0000000074BA0000-0x0000000074BD0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 316 232 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3992 wrote to memory of 232 3992 rundll32.exe rundll32.exe PID 3992 wrote to memory of 232 3992 rundll32.exe rundll32.exe PID 3992 wrote to memory of 232 3992 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff547c3d4672758597a0b6051771ff7a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff547c3d4672758597a0b6051771ff7a_JaffaCakes118.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 232 -ip 2321⤵