Analysis
-
max time kernel
95s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a.dll
-
Size
184KB
-
MD5
ce2fd18ed36bffe493b4d26444d6887c
-
SHA1
98ff55a48598914beaa46198bd1ca33039cbe197
-
SHA256
79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a
-
SHA512
60964da59f91ec33d22380bcc56c66e8143ffb008b78ed74bd364e319221d9c717a39f299ba5be4767d701528529044499efae9c736a183a050d1fbe52f61921
-
SSDEEP
3072:SJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JZa//2uFrSc:TfYOX+wTScR/Xzku9LVwquG
Malware Config
Extracted
dridex
22201
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4804-0-0x00000000755F0000-0x000000007561F000-memory.dmp dridex_ldr behavioral2/memory/4804-3-0x00000000755F0000-0x000000007561F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3608 4804 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 768 wrote to memory of 4804 768 rundll32.exe 82 PID 768 wrote to memory of 4804 768 rundll32.exe 82 PID 768 wrote to memory of 4804 768 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 6243⤵
- Program crash
PID:3608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4804 -ip 48041⤵PID:2684