Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e4546347dc8a849b362ac8e4f933872c8576d7e41cc9f9c428400193cb833f57.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e4546347dc8a849b362ac8e4f933872c8576d7e41cc9f9c428400193cb833f57.dll
-
Size
184KB
-
MD5
377d8a70495b45c45f19b4807f44d0d3
-
SHA1
f6577e3df20bd0dfa5e198f7aa4e9b2aa3441f70
-
SHA256
e4546347dc8a849b362ac8e4f933872c8576d7e41cc9f9c428400193cb833f57
-
SHA512
e6be949e5a1d7c67a24792a8ede91ef71c54713532e3b9fad603ca9ac1e5029a6ba663039e52135d034c0add50892161b4931a7b46b8937f5876139cb576b3c8
-
SSDEEP
3072:ZuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KWlmsb:T7TXYsd9SkONU1jKGlZlm
Malware Config
Extracted
dridex
22202
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2072-1-0x00000000749E0000-0x0000000074A10000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2128 2072 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2384 wrote to memory of 2072 2384 rundll32.exe 30 PID 2072 wrote to memory of 2128 2072 rundll32.exe 32 PID 2072 wrote to memory of 2128 2072 rundll32.exe 32 PID 2072 wrote to memory of 2128 2072 rundll32.exe 32 PID 2072 wrote to memory of 2128 2072 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e4546347dc8a849b362ac8e4f933872c8576d7e41cc9f9c428400193cb833f57.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e4546347dc8a849b362ac8e4f933872c8576d7e41cc9f9c428400193cb833f57.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 2203⤵
- Program crash
PID:2128
-
-