Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_85f5d013afd7c21aad7a5c981e666491b351196dd44dcf9a65cec44a2eb487f6.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_85f5d013afd7c21aad7a5c981e666491b351196dd44dcf9a65cec44a2eb487f6.dll
-
Size
178KB
-
MD5
824473025b05938bf82f2f4b7a574802
-
SHA1
fbae066406e9973f7348ef01f237b5a95d39d322
-
SHA256
85f5d013afd7c21aad7a5c981e666491b351196dd44dcf9a65cec44a2eb487f6
-
SHA512
0d58f8e287b2f3311d16a1b11bf973558b1b8d49f1ae5faffd801a941abb2a531a71e52c08404e6521ceda5c540af2e89aeca2867dcdc419f98be5363737ba9b
-
SSDEEP
3072:XZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtuUucGZ2:XUAk9I4vgz/V2dulz6/hvHhG
Malware Config
Extracted
dridex
22201
142.93.223.149:443
128.199.36.62:4664
50.116.54.215:13786
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1624-0-0x0000000075200000-0x0000000075231000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1624 1848 rundll32.exe 30 PID 1848 wrote to memory of 1624 1848 rundll32.exe 30 PID 1848 wrote to memory of 1624 1848 rundll32.exe 30 PID 1848 wrote to memory of 1624 1848 rundll32.exe 30 PID 1848 wrote to memory of 1624 1848 rundll32.exe 30 PID 1848 wrote to memory of 1624 1848 rundll32.exe 30 PID 1848 wrote to memory of 1624 1848 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_85f5d013afd7c21aad7a5c981e666491b351196dd44dcf9a65cec44a2eb487f6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_85f5d013afd7c21aad7a5c981e666491b351196dd44dcf9a65cec44a2eb487f6.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1624
-