Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-10-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
733eb4258862caab6c852260e4fd4c15_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
733eb4258862caab6c852260e4fd4c15_JaffaCakes118.dll
-
Size
184KB
-
MD5
733eb4258862caab6c852260e4fd4c15
-
SHA1
091562af0fa8d68d8c6a7dfe27f72f54c5ec514a
-
SHA256
f816a2a215b417485381f5f8196eb24864cc0557a93546cf5a1fb430984c1440
-
SHA512
caf769cfa8e9f0db1e04fc87acc36899dd3832f8243e3c5a0b7e76a7aaa9b0ba9ccbe762a655b9bf39d8015b0914ba0d960c5d1cd4b3ae9307c05d475de422c7
-
SSDEEP
3072:2DHMD9LnP1KxPqM8/1xYTCKJJ+xpm2s7E7jnR1VzGQiEFMFysvQ:2MhP1cq7/16CT9jnR1Vz7iB
Malware Config
Extracted
dridex
22201
137.74.112.43:443
216.108.227.55:6225
94.177.176.51:5723
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2336-1-0x0000000074AD0000-0x0000000074B00000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2184 2336 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2128 wrote to memory of 2336 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2336 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2336 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2336 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2336 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2336 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2336 2128 rundll32.exe rundll32.exe PID 2336 wrote to memory of 2184 2336 rundll32.exe WerFault.exe PID 2336 wrote to memory of 2184 2336 rundll32.exe WerFault.exe PID 2336 wrote to memory of 2184 2336 rundll32.exe WerFault.exe PID 2336 wrote to memory of 2184 2336 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\733eb4258862caab6c852260e4fd4c15_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\733eb4258862caab6c852260e4fd4c15_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 2203⤵
- Program crash
PID:2184
-
-