Analysis
-
max time kernel
79s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
da89cf3606cd723551524a0f64ba76de_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
da89cf3606cd723551524a0f64ba76de_JaffaCakes118.dll
-
Size
324KB
-
MD5
da89cf3606cd723551524a0f64ba76de
-
SHA1
8b6b1dd793811066522e4a1b86858dee09a37faf
-
SHA256
5b4337f9ae1d91113c91abd0da39794d8aa216b149562440de541ca99618840d
-
SHA512
75320d1c948b17efe84d5261172ff2e220847a751761334fb2d0ed1fd7a26c1d958005d3082f4ac4e2987427cc54b8c429e12d99a9445524b03e199c1126c627
-
SSDEEP
6144:3udkKJ4hF7popQTRq3va4jl6u31Ut+Ji370HnBs4NeuVCC:97yUReva4jlNoQnBXek1
Malware Config
Extracted
dridex
10444
51.75.24.85:443
46.22.116.163:3074
173.249.46.113:3889
192.241.174.45:4443
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4732 4364 rundll32.exe 82 PID 4364 wrote to memory of 4732 4364 rundll32.exe 82 PID 4364 wrote to memory of 4732 4364 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da89cf3606cd723551524a0f64ba76de_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da89cf3606cd723551524a0f64ba76de_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4732
-