Analysis
-
max time kernel
60s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
a7d9a78e7d3a8332315dca1300c398fb_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
a7d9a78e7d3a8332315dca1300c398fb_JaffaCakes118.dll
-
Size
324KB
-
MD5
a7d9a78e7d3a8332315dca1300c398fb
-
SHA1
8ffea97320c626ebb9589aa929815ebcf306111b
-
SHA256
25d838419ca42f920a05afe582e328ca7bc5d498ae642b20f114b4415077d7f9
-
SHA512
81e4b362c9dd419d0ab0423c67b7628c10c1399326b3b6f670ca14972bd179d58efa9017db681fa8b02f35f21425584e7c9ca72efb2b796aeedec93e4ed91902
-
SSDEEP
6144:VudqKJ4hF7popQTRq3va4jl6u31Ut+Ji370HnBs4NeuVCC:h7yUReva4jlNoQnBXek1
Malware Config
Extracted
dridex
10444
51.75.24.85:443
46.22.116.163:3074
173.249.46.113:3889
192.241.174.45:4443
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3676 wrote to memory of 3436 3676 rundll32.exe 84 PID 3676 wrote to memory of 3436 3676 rundll32.exe 84 PID 3676 wrote to memory of 3436 3676 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7d9a78e7d3a8332315dca1300c398fb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7d9a78e7d3a8332315dca1300c398fb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3436
-