Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f05524a05fb3a90082a7e59a27b1e451481e4355e28bb449ecfd479d75f435b8.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f05524a05fb3a90082a7e59a27b1e451481e4355e28bb449ecfd479d75f435b8.dll
-
Size
188KB
-
MD5
404f509f37ae90d7659c2386fbae7f69
-
SHA1
be439fbcbe897802766052fc3bb29929b5712129
-
SHA256
f05524a05fb3a90082a7e59a27b1e451481e4355e28bb449ecfd479d75f435b8
-
SHA512
6db307ad65236ad663f1b09e90304ef6a1d9e27d8c9e472ddfdea0613d5014b0beb2913fb8947aca505f2d9b419b93f02c6fe666ab4ebf177eb8a879784acf61
-
SSDEEP
3072:AteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz99qM:Uq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2036-1-0x00000000746C0000-0x00000000746F0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2452 2036 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2036 3044 rundll32.exe 31 PID 3044 wrote to memory of 2036 3044 rundll32.exe 31 PID 3044 wrote to memory of 2036 3044 rundll32.exe 31 PID 3044 wrote to memory of 2036 3044 rundll32.exe 31 PID 3044 wrote to memory of 2036 3044 rundll32.exe 31 PID 3044 wrote to memory of 2036 3044 rundll32.exe 31 PID 3044 wrote to memory of 2036 3044 rundll32.exe 31 PID 2036 wrote to memory of 2452 2036 rundll32.exe 32 PID 2036 wrote to memory of 2452 2036 rundll32.exe 32 PID 2036 wrote to memory of 2452 2036 rundll32.exe 32 PID 2036 wrote to memory of 2452 2036 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f05524a05fb3a90082a7e59a27b1e451481e4355e28bb449ecfd479d75f435b8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f05524a05fb3a90082a7e59a27b1e451481e4355e28bb449ecfd479d75f435b8.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 3003⤵
- Program crash
PID:2452
-
-