Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 09:26 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f96ed9798a86155ce406197dc3e8aaa1787b918a6b0da9859530fc5d63d279cf.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_f96ed9798a86155ce406197dc3e8aaa1787b918a6b0da9859530fc5d63d279cf.dll
-
Size
184KB
-
MD5
9fdab93e18b83abd916bf1f35502276c
-
SHA1
610557006b23fa00805648ef62faada721de1a1b
-
SHA256
f96ed9798a86155ce406197dc3e8aaa1787b918a6b0da9859530fc5d63d279cf
-
SHA512
f2ac6c0600b7442808f7d48b98dac49f6a2d215ce41d341cc03541230a2d952a440001899c2fa7922ffc736238844d5b08eb5e8b095dd48648644e4e262b23f1
-
SSDEEP
3072:jiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao+lzoxss7:jiLVCIT4WK2z1W+CUHZj4Skq/eaocoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/1588-1-0x00000000756F0000-0x000000007571F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3536 1588 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4128 wrote to memory of 1588 4128 rundll32.exe 83 PID 4128 wrote to memory of 1588 4128 rundll32.exe 83 PID 4128 wrote to memory of 1588 4128 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f96ed9798a86155ce406197dc3e8aaa1787b918a6b0da9859530fc5d63d279cf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f96ed9798a86155ce406197dc3e8aaa1787b918a6b0da9859530fc5d63d279cf.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 6163⤵
- Program crash
PID:3536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1588 -ip 15881⤵PID:2748
Network
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.49.80.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.49.80.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
70 B 145 B 1 1
DNS Request
21.49.80.91.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
20.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
70 B 145 B 1 1
DNS Request
22.49.80.91.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa