Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6732ec4d2b32bc3721e1f4746b13d84b6148b4099aefc298b16f4f8965227a1e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6732ec4d2b32bc3721e1f4746b13d84b6148b4099aefc298b16f4f8965227a1e.dll
-
Size
188KB
-
MD5
4b26e5091018547f5133c6d4d8b29a8e
-
SHA1
715b4d6eb4184a5dabf9185995455999c34124f7
-
SHA256
6732ec4d2b32bc3721e1f4746b13d84b6148b4099aefc298b16f4f8965227a1e
-
SHA512
c37ea16e7e558070b1d6bd6195369ff00c512ef6c0f36935933b2e3605c10932112485651ad99a91fa04124a951237da9f58d413b845b7dc4cac9ce7cd8644aa
-
SSDEEP
3072:rA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo0o:rzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2444-1-0x0000000075000000-0x0000000075030000-memory.dmp dridex_ldr behavioral1/memory/2444-2-0x0000000075000000-0x0000000075030000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3028 2444 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2444 2212 rundll32.exe 30 PID 2212 wrote to memory of 2444 2212 rundll32.exe 30 PID 2212 wrote to memory of 2444 2212 rundll32.exe 30 PID 2212 wrote to memory of 2444 2212 rundll32.exe 30 PID 2212 wrote to memory of 2444 2212 rundll32.exe 30 PID 2212 wrote to memory of 2444 2212 rundll32.exe 30 PID 2212 wrote to memory of 2444 2212 rundll32.exe 30 PID 2444 wrote to memory of 3028 2444 rundll32.exe 32 PID 2444 wrote to memory of 3028 2444 rundll32.exe 32 PID 2444 wrote to memory of 3028 2444 rundll32.exe 32 PID 2444 wrote to memory of 3028 2444 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6732ec4d2b32bc3721e1f4746b13d84b6148b4099aefc298b16f4f8965227a1e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6732ec4d2b32bc3721e1f4746b13d84b6148b4099aefc298b16f4f8965227a1e.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 3003⤵
- Program crash
PID:3028
-
-