Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2.dll
-
Size
184KB
-
MD5
32b36df1174af957c878780c87b7c099
-
SHA1
5086ef16a83a9a8322dc78891370a42723720678
-
SHA256
5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2
-
SHA512
6b6a99f5a2c5bb3433142c520c94ea49d49fab87a0ada374b730d1daff04019b542fa96bf60b30b9881e2fc0b58e451a381dbdfdbf45e629c389669ef4da0b3a
-
SSDEEP
3072:CiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSlzoxss7:CiLVCIT4WK2z1W+CUHZj4Skq/eaoYoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/1832-0-0x0000000074D10000-0x0000000074D3F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4016 1832 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 536 wrote to memory of 1832 536 rundll32.exe 83 PID 536 wrote to memory of 1832 536 rundll32.exe 83 PID 536 wrote to memory of 1832 536 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ad44c135083f3413d75f0ecbe2d967f767933117b7d443fedd941f1069e1ec2.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 6203⤵
- Program crash
PID:4016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1832 -ip 18321⤵PID:4372