Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639.dll
-
Size
188KB
-
MD5
c88155c6695a1ff49c9efcdffc38fb47
-
SHA1
82b3d0af0e387ed8db1492faf9ccc1f9302a78c0
-
SHA256
eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639
-
SHA512
8c6b58df24e928b6fd1e31a8b572fb3cc3ed77e9916da977556e3a4e2127ba74acb0a8351661cc97a63069e91e3cd068eb65245cb5b4e6dc9c076be4ceab1b36
-
SSDEEP
3072:tA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoKo:tzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2300-1-0x0000000074C80000-0x0000000074CB0000-memory.dmp dridex_ldr behavioral1/memory/2300-2-0x0000000074C80000-0x0000000074CB0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2336 2300 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2300 1984 rundll32.exe 31 PID 1984 wrote to memory of 2300 1984 rundll32.exe 31 PID 1984 wrote to memory of 2300 1984 rundll32.exe 31 PID 1984 wrote to memory of 2300 1984 rundll32.exe 31 PID 1984 wrote to memory of 2300 1984 rundll32.exe 31 PID 1984 wrote to memory of 2300 1984 rundll32.exe 31 PID 1984 wrote to memory of 2300 1984 rundll32.exe 31 PID 2300 wrote to memory of 2336 2300 rundll32.exe 32 PID 2300 wrote to memory of 2336 2300 rundll32.exe 32 PID 2300 wrote to memory of 2336 2300 rundll32.exe 32 PID 2300 wrote to memory of 2336 2300 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 3003⤵
- Program crash
PID:2336
-
-