Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_728d30cfb9f268c82ed6117432d873cacf89c8e5f697d36d1338cb770c10dd41.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_728d30cfb9f268c82ed6117432d873cacf89c8e5f697d36d1338cb770c10dd41.dll
-
Size
163KB
-
MD5
e55730cce96581d39f107fd0ba939314
-
SHA1
daff90535f72617b4f3e34caedbd5fa85750411c
-
SHA256
728d30cfb9f268c82ed6117432d873cacf89c8e5f697d36d1338cb770c10dd41
-
SHA512
f372bb83018db2ea3c9652fff8361ea45cf61c8a0e941ec32b64c4d9485105aedb9c3d7469e22d2dc42a28a7ca22126ecd6355969108f8f7e249d895bf97bb77
-
SSDEEP
3072:K9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:K9F6rQXvFczvYpQP
Malware Config
Extracted
dridex
22201
43.229.206.212:443
82.209.17.209:8172
162.241.209.225:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2280-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2480 2280 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2280 2316 rundll32.exe 31 PID 2316 wrote to memory of 2280 2316 rundll32.exe 31 PID 2316 wrote to memory of 2280 2316 rundll32.exe 31 PID 2316 wrote to memory of 2280 2316 rundll32.exe 31 PID 2316 wrote to memory of 2280 2316 rundll32.exe 31 PID 2316 wrote to memory of 2280 2316 rundll32.exe 31 PID 2316 wrote to memory of 2280 2316 rundll32.exe 31 PID 2280 wrote to memory of 2480 2280 rundll32.exe 32 PID 2280 wrote to memory of 2480 2280 rundll32.exe 32 PID 2280 wrote to memory of 2480 2280 rundll32.exe 32 PID 2280 wrote to memory of 2480 2280 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_728d30cfb9f268c82ed6117432d873cacf89c8e5f697d36d1338cb770c10dd41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_728d30cfb9f268c82ed6117432d873cacf89c8e5f697d36d1338cb770c10dd41.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 2363⤵
- Program crash
PID:2480
-
-