Analysis
-
max time kernel
140s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 12:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
16017353e67868fd3b785aa22db51efb_JaffaCakes118.dll
Resource
win7-20240508-en
6 signatures
150 seconds
General
-
Target
16017353e67868fd3b785aa22db51efb_JaffaCakes118.dll
-
Size
168KB
-
MD5
16017353e67868fd3b785aa22db51efb
-
SHA1
c85f9fca75fab04d74bbece3c180f318d55581dd
-
SHA256
0c262ad9b5f041419149ee032e82abe2f7d06d263de648214c2a484436587d9a
-
SHA512
ac6e5395d17aa97fd0fd2b7748c7525b139a339b9f86e14a714bc57d193af4c825c0584a446830a3fb51d68687be6f193412bab7d3c86efc5e32836454a56586
-
SSDEEP
3072:p+rGFFRCMcyzAAykMPqIaXpZYnvf3gx4wblxLSoIm/H2QKGB2gC:p+rGFFlXAAcqj8nHgfOoIdG
Malware Config
Extracted
Family
dridex
Botnet
111
C2
173.203.78.138:443
217.160.107.189:6601
77.220.64.150:5037
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/1200-0-0x0000000075250000-0x000000007527C000-memory.dmp dridex_ldr behavioral2/memory/1200-2-0x0000000075250000-0x000000007527C000-memory.dmp dridex_ldr behavioral2/memory/1200-3-0x0000000075250000-0x000000007527C000-memory.dmp dridex_ldr -
Blocklisted process makes network request 1 IoCs
flow pid Process 31 1200 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1200 2376 rundll32.exe 82 PID 2376 wrote to memory of 1200 2376 rundll32.exe 82 PID 2376 wrote to memory of 1200 2376 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16017353e67868fd3b785aa22db51efb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16017353e67868fd3b785aa22db51efb_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1200
-