Analysis
-
max time kernel
47s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2024 20:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0cc7af63e6b7bb5786a883cc88d84c0f_JaffaCakes118.dll
Resource
win7-20240419-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0cc7af63e6b7bb5786a883cc88d84c0f_JaffaCakes118.dll
-
Size
296KB
-
MD5
0cc7af63e6b7bb5786a883cc88d84c0f
-
SHA1
62081e06d03f6332db9d6fb69fc920c887d1fb45
-
SHA256
de71238112f239dc2aadbad129db8beb45a64a5e3da042929a7b85480fdd11a1
-
SHA512
f6add26b1ed9d6aebff04731153ae75cf408742dbf8a706f8b87b1ed6d8bc4f4bfdd8df83bc003548c7b6ebfafaa1cdf3233f9aeaf1e83fab4a11e66a71e98c5
-
SSDEEP
6144:gX0++0XgkCbjM69qzmyEuoUvcEfjQ026I8ZCovc5tffn:0P6JqOnScOjQ/ICovcb3n
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
199.66.90.63:443
85.214.26.7:3389
51.68.224.245:4646
107.175.87.150:3889
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4136-0-0x0000000075120000-0x000000007516B000-memory.dmp dridex_ldr_dmod behavioral2/memory/4136-3-0x0000000075120000-0x000000007516B000-memory.dmp dridex_ldr_dmod -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4796 wrote to memory of 4136 4796 rundll32.exe rundll32.exe PID 4796 wrote to memory of 4136 4796 rundll32.exe rundll32.exe PID 4796 wrote to memory of 4136 4796 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc7af63e6b7bb5786a883cc88d84c0f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc7af63e6b7bb5786a883cc88d84c0f_JaffaCakes118.dll,#12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:5052