Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ee6b39d6fa056df0e1f948e578f86a8a96665f818eafbcc6df0deb8b21f0529.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7ee6b39d6fa056df0e1f948e578f86a8a96665f818eafbcc6df0deb8b21f0529.dll
-
Size
163KB
-
MD5
8b85884d2235b00928169fbc18ea797d
-
SHA1
a8edae7a4939dc90f6f1c959db2047d4556870fa
-
SHA256
7ee6b39d6fa056df0e1f948e578f86a8a96665f818eafbcc6df0deb8b21f0529
-
SHA512
690f8a7eef42c2b30dbc9230ef2716de80cf55ed17791b1ea02c887420e84d234601b61e87bc39dd6b153c09aece9d640b00003d1704eea86f5df96aadc1cacb
-
SSDEEP
3072:6ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:8s4p+ADxnSO6D2cOp
Malware Config
Extracted
dridex
22202
43.229.206.212:443
82.209.17.209:8172
162.241.209.225:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1660-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2236 1660 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 1660 wrote to memory of 2236 1660 rundll32.exe 32 PID 1660 wrote to memory of 2236 1660 rundll32.exe 32 PID 1660 wrote to memory of 2236 1660 rundll32.exe 32 PID 1660 wrote to memory of 2236 1660 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ee6b39d6fa056df0e1f948e578f86a8a96665f818eafbcc6df0deb8b21f0529.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ee6b39d6fa056df0e1f948e578f86a8a96665f818eafbcc6df0deb8b21f0529.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2363⤵
- Program crash
PID:2236
-
-