Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_73cf4c5f5c7eba48f8f1f84a3f31eb960d891d1b3cd56726bf7c304fd967a53e.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_73cf4c5f5c7eba48f8f1f84a3f31eb960d891d1b3cd56726bf7c304fd967a53e.dll
-
Size
188KB
-
MD5
a29c83bcf43ae56739af5ff1f68d1f9a
-
SHA1
39d89f659bb0eb3a4267754a3b4989b74b05fbf1
-
SHA256
73cf4c5f5c7eba48f8f1f84a3f31eb960d891d1b3cd56726bf7c304fd967a53e
-
SHA512
b2aa283576922b762ad82dc1cf4d7d05e4a91e27269d16d6ccf7bf55a80f10ac99ab29e1f571ec3181a274fadecaf848f44587e7f8c9f50f6bce9fc42c5a41ad
-
SSDEEP
3072:8A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoMo:8zIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2664-0-0x0000000075390000-0x00000000753C0000-memory.dmp dridex_ldr behavioral1/memory/2664-3-0x0000000075390000-0x00000000753C0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2824 2664 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2664 2028 rundll32.exe 30 PID 2028 wrote to memory of 2664 2028 rundll32.exe 30 PID 2028 wrote to memory of 2664 2028 rundll32.exe 30 PID 2028 wrote to memory of 2664 2028 rundll32.exe 30 PID 2028 wrote to memory of 2664 2028 rundll32.exe 30 PID 2028 wrote to memory of 2664 2028 rundll32.exe 30 PID 2028 wrote to memory of 2664 2028 rundll32.exe 30 PID 2664 wrote to memory of 2824 2664 rundll32.exe 31 PID 2664 wrote to memory of 2824 2664 rundll32.exe 31 PID 2664 wrote to memory of 2824 2664 rundll32.exe 31 PID 2664 wrote to memory of 2824 2664 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_73cf4c5f5c7eba48f8f1f84a3f31eb960d891d1b3cd56726bf7c304fd967a53e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_73cf4c5f5c7eba48f8f1f84a3f31eb960d891d1b3cd56726bf7c304fd967a53e.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 3003⤵
- Program crash
PID:2824
-
-