Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_43fcc7deb4ec617cced766005cbd9af7af6e02490bdc2238df4ffd68df3a02b3.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_43fcc7deb4ec617cced766005cbd9af7af6e02490bdc2238df4ffd68df3a02b3.dll
-
Size
161KB
-
MD5
3e4ee1cda3fe2b2901c9976648840c6a
-
SHA1
83590be3e575bd1834f13de4ba4a8e8afcaedba3
-
SHA256
43fcc7deb4ec617cced766005cbd9af7af6e02490bdc2238df4ffd68df3a02b3
-
SHA512
8cc3021ce601632c677ed8397d6e548d103a5c3a96db7d1406e89d52ae6360fce634cdbfe81e6fabf1fa5386ef7331357b2f9d64fe5879b92610d59b9acd36c2
-
SSDEEP
3072:RaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:MnS62Fl+pkeJl3CvRStrFl+EYE
Malware Config
Extracted
dridex
22202
78.46.73.125:443
185.148.168.26:2303
66.113.160.126:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4716-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr behavioral2/memory/4716-2-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1184 4716 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2544 wrote to memory of 4716 2544 rundll32.exe 83 PID 2544 wrote to memory of 4716 2544 rundll32.exe 83 PID 2544 wrote to memory of 4716 2544 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fcc7deb4ec617cced766005cbd9af7af6e02490bdc2238df4ffd68df3a02b3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_43fcc7deb4ec617cced766005cbd9af7af6e02490bdc2238df4ffd68df3a02b3.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 7123⤵
- Program crash
PID:1184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4716 -ip 47161⤵PID:2120