Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_491ce8f5cd4813f539c490206bc00d27eea8844f73d28fbaff43db0d9bc8efc4.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_491ce8f5cd4813f539c490206bc00d27eea8844f73d28fbaff43db0d9bc8efc4.dll
-
Size
161KB
-
MD5
9c050192cfaccda3702b484719744384
-
SHA1
af0e7ebbdc52d569881eab9bc12eeb6bdfe174b4
-
SHA256
491ce8f5cd4813f539c490206bc00d27eea8844f73d28fbaff43db0d9bc8efc4
-
SHA512
c5a91fc6714670e8a7e0b75b4017a256a147f4e20c0fd18aa4f35698e2ccb15708b7fe9d32640cd711ea9aa3cdd11909c0f400ce5908f8ddb89ff6fa565cd717
-
SSDEEP
3072:884Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:gDBdOlG0nyg1DvwxgZ/v
Malware Config
Extracted
dridex
22202
45.55.134.126:443
67.207.83.96:8172
193.160.214.95:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3868-0-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1936 3868 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3336 wrote to memory of 3868 3336 rundll32.exe 83 PID 3336 wrote to memory of 3868 3336 rundll32.exe 83 PID 3336 wrote to memory of 3868 3336 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_491ce8f5cd4813f539c490206bc00d27eea8844f73d28fbaff43db0d9bc8efc4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_491ce8f5cd4813f539c490206bc00d27eea8844f73d28fbaff43db0d9bc8efc4.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 7163⤵
- Program crash
PID:1936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3868 -ip 38681⤵PID:1660