Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_59d968b0096ffe4f4ef85a00ae25c46d89889c1a5f225681a1beba4e538a5763.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_59d968b0096ffe4f4ef85a00ae25c46d89889c1a5f225681a1beba4e538a5763.dll
-
Size
188KB
-
MD5
f3c2716e8939a3fb4e72eeb9f500c539
-
SHA1
c4bae372082884800c7cc686422468dcbd1c144a
-
SHA256
59d968b0096ffe4f4ef85a00ae25c46d89889c1a5f225681a1beba4e538a5763
-
SHA512
53d3f7d5a19ed9831383bd649d2aa7a079c9895059a5212c3ed69a65a8596e74a4059b679400f79b245e16ffd5b41f0b3627a49cb6e80ce320e6330e0590a1f2
-
SSDEEP
3072:RA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoqo:RzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2296-1-0x0000000074B20000-0x0000000074B50000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2324 2296 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 876 wrote to memory of 2296 876 rundll32.exe 31 PID 876 wrote to memory of 2296 876 rundll32.exe 31 PID 876 wrote to memory of 2296 876 rundll32.exe 31 PID 876 wrote to memory of 2296 876 rundll32.exe 31 PID 876 wrote to memory of 2296 876 rundll32.exe 31 PID 876 wrote to memory of 2296 876 rundll32.exe 31 PID 876 wrote to memory of 2296 876 rundll32.exe 31 PID 2296 wrote to memory of 2324 2296 rundll32.exe 32 PID 2296 wrote to memory of 2324 2296 rundll32.exe 32 PID 2296 wrote to memory of 2324 2296 rundll32.exe 32 PID 2296 wrote to memory of 2324 2296 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59d968b0096ffe4f4ef85a00ae25c46d89889c1a5f225681a1beba4e538a5763.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59d968b0096ffe4f4ef85a00ae25c46d89889c1a5f225681a1beba4e538a5763.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 3003⤵
- Program crash
PID:2324
-
-