Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2.dll
-
Size
184KB
-
MD5
32b36df1174af957c878780c87b7c099
-
SHA1
5086ef16a83a9a8322dc78891370a42723720678
-
SHA256
5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2
-
SHA512
6b6a99f5a2c5bb3433142c520c94ea49d49fab87a0ada374b730d1daff04019b542fa96bf60b30b9881e2fc0b58e451a381dbdfdbf45e629c389669ef4da0b3a
-
SSDEEP
3072:CiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSlzoxss7:CiLVCIT4WK2z1W+CUHZj4Skq/eaoYoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1116-1-0x0000000074B90000-0x0000000074BBF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2812 1116 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 804 wrote to memory of 1116 804 rundll32.exe 31 PID 804 wrote to memory of 1116 804 rundll32.exe 31 PID 804 wrote to memory of 1116 804 rundll32.exe 31 PID 804 wrote to memory of 1116 804 rundll32.exe 31 PID 804 wrote to memory of 1116 804 rundll32.exe 31 PID 804 wrote to memory of 1116 804 rundll32.exe 31 PID 804 wrote to memory of 1116 804 rundll32.exe 31 PID 1116 wrote to memory of 2812 1116 rundll32.exe 32 PID 1116 wrote to memory of 2812 1116 rundll32.exe 32 PID 1116 wrote to memory of 2812 1116 rundll32.exe 32 PID 1116 wrote to memory of 2812 1116 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 2243⤵
- Program crash
PID:2812
-
-