Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_aef534dde3fb8f0aaf318bb64412d789bc1742982929a412de255747de138e8d.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_aef534dde3fb8f0aaf318bb64412d789bc1742982929a412de255747de138e8d.dll
-
Size
188KB
-
MD5
9f67444c2b17e36ccbdc155ea5f6ba6b
-
SHA1
ceb3c6da1e522e5783923bd5c8049d148b9ff2f8
-
SHA256
aef534dde3fb8f0aaf318bb64412d789bc1742982929a412de255747de138e8d
-
SHA512
6e51528a8ec92a077f801819085465939dcd691b2d6814c768a00da20fbb9fe6d1f27f90a5a2eb2920532c92525ff7e0ef9204ace165838d934b27ec998cc665
-
SSDEEP
3072:dteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzb9qM:pq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2072-1-0x00000000749F0000-0x0000000074A20000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1720 2072 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 2072 wrote to memory of 1720 2072 rundll32.exe 32 PID 2072 wrote to memory of 1720 2072 rundll32.exe 32 PID 2072 wrote to memory of 1720 2072 rundll32.exe 32 PID 2072 wrote to memory of 1720 2072 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aef534dde3fb8f0aaf318bb64412d789bc1742982929a412de255747de138e8d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aef534dde3fb8f0aaf318bb64412d789bc1742982929a412de255747de138e8d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 3003⤵
- Program crash
PID:1720
-
-