Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3e9f14ece33a922e5446786e8cb339e3e631701bb8f884ff74eea3b5a99d1672.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3e9f14ece33a922e5446786e8cb339e3e631701bb8f884ff74eea3b5a99d1672.dll
-
Size
188KB
-
MD5
7135bd4fbb59913224e028135fcd8fb5
-
SHA1
1499c58fbde60e7734873fc03c54aed8a3d1b6d4
-
SHA256
3e9f14ece33a922e5446786e8cb339e3e631701bb8f884ff74eea3b5a99d1672
-
SHA512
c912bdc91ac9799b24684de738d690833c8cdca64feb78bcac428307a9d0f481521da97356294e99badf3a67365604d7db6299d342df3cf6157aa150f7a697fd
-
SSDEEP
3072:hteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzT9qM:tq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2984-1-0x0000000074B10000-0x0000000074B40000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2932 2984 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 1480 wrote to memory of 2984 1480 rundll32.exe 30 PID 2984 wrote to memory of 2932 2984 rundll32.exe 32 PID 2984 wrote to memory of 2932 2984 rundll32.exe 32 PID 2984 wrote to memory of 2932 2984 rundll32.exe 32 PID 2984 wrote to memory of 2932 2984 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e9f14ece33a922e5446786e8cb339e3e631701bb8f884ff74eea3b5a99d1672.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e9f14ece33a922e5446786e8cb339e3e631701bb8f884ff74eea3b5a99d1672.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 3003⤵
- Program crash
PID:2932
-
-