Analysis
-
max time kernel
96s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639.dll
-
Size
188KB
-
MD5
c88155c6695a1ff49c9efcdffc38fb47
-
SHA1
82b3d0af0e387ed8db1492faf9ccc1f9302a78c0
-
SHA256
eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639
-
SHA512
8c6b58df24e928b6fd1e31a8b572fb3cc3ed77e9916da977556e3a4e2127ba74acb0a8351661cc97a63069e91e3cd068eb65245cb5b4e6dc9c076be4ceab1b36
-
SSDEEP
3072:tA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoKo:tzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4272-0-0x0000000074980000-0x00000000749B0000-memory.dmp dridex_ldr behavioral2/memory/4272-3-0x0000000074980000-0x00000000749B0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4748 4272 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4272 3672 rundll32.exe 83 PID 3672 wrote to memory of 4272 3672 rundll32.exe 83 PID 3672 wrote to memory of 4272 3672 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb444423f03cbfcb50ddded1f548a6476453e4f2a0ca2bf60d3fd06d9f9ba639.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 6883⤵
- Program crash
PID:4748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4272 -ip 42721⤵PID:3604