Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
e3811e87a0f66d9fe5bb08ed27e1e7f2_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
e3811e87a0f66d9fe5bb08ed27e1e7f2_JaffaCakes118.dll
-
Size
576KB
-
MD5
e3811e87a0f66d9fe5bb08ed27e1e7f2
-
SHA1
039ee29cf08222cd723d68211a1951c7e6edfeb1
-
SHA256
96b12040d044830cf41890f2806c935ae4e9f8c572c41a5ed3e4551b16403508
-
SHA512
f89cadfad08994118560053ebcbbc3acfc33c50ceb586ecf5520ef287737136d28555d27f6df4d3b11c79a710f2685029534ec913107b9d7db4e34b82ffe786e
-
SSDEEP
12288:wAEJhkFK62GbYs054M795+voCUxusp39b6nf/DhMsNNUqXAnT:wdJS2GN0aY5goao9b6nt9NRQnT
Malware Config
Extracted
dridex
10444
77.220.64.131:443
5.196.204.251:5037
192.99.41.136:981
24.229.3.146:4664
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 20 2136 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4436 wrote to memory of 2136 4436 rundll32.exe rundll32.exe PID 4436 wrote to memory of 2136 4436 rundll32.exe rundll32.exe PID 4436 wrote to memory of 2136 4436 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3811e87a0f66d9fe5bb08ed27e1e7f2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3811e87a0f66d9fe5bb08ed27e1e7f2_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2136
-