Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_54f56ed92f27c2eb2b7e389a1764ce0eab104d2baaf1c076eea295fccf7b6d2c.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_54f56ed92f27c2eb2b7e389a1764ce0eab104d2baaf1c076eea295fccf7b6d2c.dll
-
Size
184KB
-
MD5
b543910edab5419f343fd73ab25fccbd
-
SHA1
9c6cb4c31d80c3519d22e75849d43e340cd37d2b
-
SHA256
54f56ed92f27c2eb2b7e389a1764ce0eab104d2baaf1c076eea295fccf7b6d2c
-
SHA512
d6be9b066a790576a046736ddcfc2cb2387d93dfd22be497c1a2e766d22eae5dbf1adb519d6e6cd6fc6d2df8b191a7dd573babea4d81f01ec7d00c144fdcfe66
-
SSDEEP
3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoulzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaosoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4840-1-0x0000000075810000-0x000000007583F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 4840 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1728 wrote to memory of 4840 1728 rundll32.exe 81 PID 1728 wrote to memory of 4840 1728 rundll32.exe 81 PID 1728 wrote to memory of 4840 1728 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_54f56ed92f27c2eb2b7e389a1764ce0eab104d2baaf1c076eea295fccf7b6d2c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_54f56ed92f27c2eb2b7e389a1764ce0eab104d2baaf1c076eea295fccf7b6d2c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 6163⤵
- Program crash
PID:2700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4840 -ip 48401⤵PID:4716