Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 03:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2ad88b77551488cce9e7b33a6f6af6bc_JaffaCakes118.dll
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
2ad88b77551488cce9e7b33a6f6af6bc_JaffaCakes118.dll
-
Size
920KB
-
MD5
2ad88b77551488cce9e7b33a6f6af6bc
-
SHA1
3ffe54dd18132fb8fae311c5c6d7ce0250ff5cef
-
SHA256
b6bd8479ef5943eaf26efdcda11ab09bf0569ad2295ba905fc0901511ca7c286
-
SHA512
5500d544187da7d097f91297d9c86350aca2a36ec82ff6652b1fb95ae7e89e1862c27545c86ec41166237ee9abd66374c5bd4a39a5a0ef16340d004dda45d982
-
SSDEEP
24576:ftWfnaVoffEQmyO378WTkvEKT9Hgce1BHbonCm:luaq34yDWTkvvT9HgdbonC
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
209.20.87.138:443
198.1.115.153:8172
151.236.29.248:6516
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1652 rundll32.exe 5 1652 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1652 2120 rundll32.exe 28 PID 2120 wrote to memory of 1652 2120 rundll32.exe 28 PID 2120 wrote to memory of 1652 2120 rundll32.exe 28 PID 2120 wrote to memory of 1652 2120 rundll32.exe 28 PID 2120 wrote to memory of 1652 2120 rundll32.exe 28 PID 2120 wrote to memory of 1652 2120 rundll32.exe 28 PID 2120 wrote to memory of 1652 2120 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ad88b77551488cce9e7b33a6f6af6bc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ad88b77551488cce9e7b33a6f6af6bc_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1652
-