Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
f9cd129d87758bcc632b02e785a61770_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
f9cd129d87758bcc632b02e785a61770_JaffaCakes118.dll
-
Size
184KB
-
MD5
f9cd129d87758bcc632b02e785a61770
-
SHA1
44b781c1fa2e942ca63e8778594e6136782f2fe7
-
SHA256
898c5ae1f036965b06a029e399512dd0ca78492529ac62df7daf181d6b89d8d9
-
SHA512
19913f6049214e629225fc7644a99da6656ae5443fd8fb5e50a595cb8a1c638edb393c7805e8208bf2d8646f320e9bc43afdf7c2d6d929792d18244501e7fcaf
-
SSDEEP
3072:FAIkqXpPKnXkU64fT/O7fbpvcI2yuOssp5kSmrzzV4S5:FAIkjn0GL/O7lvcITYekSS3V
Malware Config
Extracted
dridex
22201
207.148.81.119:443
185.157.82.209:8333
5.39.99.208:5412
Signatures
-
resource yara_rule behavioral2/memory/3752-1-0x0000000074BD0000-0x0000000074C00000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4320 3752 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1140 wrote to memory of 3752 1140 rundll32.exe 82 PID 1140 wrote to memory of 3752 1140 rundll32.exe 82 PID 1140 wrote to memory of 3752 1140 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9cd129d87758bcc632b02e785a61770_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9cd129d87758bcc632b02e785a61770_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 6123⤵
- Program crash
PID:4320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3752 -ip 37521⤵PID:396