Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
cc3b7266c278d42cf82847332198b2ef_JaffaCakes118.vbs
Resource
win7-20240708-en
General
-
Target
cc3b7266c278d42cf82847332198b2ef_JaffaCakes118.vbs
-
Size
1.4MB
-
MD5
cc3b7266c278d42cf82847332198b2ef
-
SHA1
99fd697283f56cef6ace5f851f0c9b631ae13906
-
SHA256
7ba8fd7fe1279dd20b2b62168cdc5436acb2b61c6725f57dd79d583206b7751b
-
SHA512
c9dd0b22e95d982c7f36e398038cbcf732cc6d65b65d7210407e9f05a97758908f99693eeb19391613fe9c3869b35375764b747bd5ac9500a0b805c61396b75a
-
SSDEEP
24576:xQGaLTG43lNgtOtBjeDYtJqVIjtkbiNKydy7Ducn3YQdfzbgS8JtjdsJxQ7lxO6N:I
Malware Config
Extracted
dridex
176.126.243.82:443
167.114.122.37:691
66.34.201.20:8443
46.105.111.191:691
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 4152 rundll32.exe 91 -
resource yara_rule behavioral2/memory/1512-27-0x0000000002C60000-0x00000000035C3000-memory.dmp dridex_ldr behavioral2/memory/1512-31-0x0000000002C60000-0x00000000035C3000-memory.dmp dridex_ldr behavioral2/memory/1512-32-0x0000000002C60000-0x00000000035C3000-memory.dmp dridex_ldr -
Loads dropped DLL 2 IoCs
pid Process 1512 rundll32.exe 1512 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1512 1780 rundll32.exe 94 PID 1780 wrote to memory of 1512 1780 rundll32.exe 94 PID 1780 wrote to memory of 1512 1780 rundll32.exe 94
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cc3b7266c278d42cf82847332198b2ef_JaffaCakes118.vbs"1⤵PID:3012
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\xEGLTqDYlgDVu.txt, FontCache1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\xEGLTqDYlgDVu.txt, FontCache2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5d9a5144cc0aec565c701c75e42c0d955
SHA131e1c56b716f8c1147cec7ae2e61cad5a132ed34
SHA2560829e0a1e2afe2b4a9ed7c191ff47e5b75f84642271c3e084efb0c008ec09934
SHA512e60aef097d2d997356905c41d31153d45390405ac9954521a2b4c467bc17018af55c3feb295df5465c7309102533b4b1806e8eac9fcdaa574b8a8aa6e313bded
-
Filesize
364KB
MD5971599aea536c511a27cc5b34216cc47
SHA114fadefb9927148a490dbc4782f45471e4e80f78
SHA2569964db67176dea39fae2922636a42d8b246d6f5f8b900ec8811589baec74ff04
SHA5124430b3acb90b5e540930c18a799f46282f1f5dafbda7a0cb909bfd9aaa332cfd7e1609c00e22e3c080e762ce923de7beb54fd3433a49ae5fd2c289515571d719