Analysis
-
max time kernel
96s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_267641e1e3454a8fc90815b8c8a69f07b05ccab24b11a9978deae96f1a4cdd84.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_267641e1e3454a8fc90815b8c8a69f07b05ccab24b11a9978deae96f1a4cdd84.dll
-
Size
184KB
-
MD5
83b2acee9a14c0049aad2559b6d26cf3
-
SHA1
cebbe7fcc381b38d573dcf3c091df4d754f6e768
-
SHA256
267641e1e3454a8fc90815b8c8a69f07b05ccab24b11a9978deae96f1a4cdd84
-
SHA512
96b9905af69f62dbef22da36bc9038ee60fdc0d1b24240ee6d95036080d39638c15eaf3768542288cbbc2ef2f91b71326b2715f06e3f7f537b20d625e90048e1
-
SSDEEP
3072:GJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JJa//2uFrSc:vfYOX+wTScR/Xzku9LVwiuG
Malware Config
Extracted
dridex
22201
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/1856-1-0x0000000074DA0000-0x0000000074DCF000-memory.dmp dridex_ldr behavioral2/memory/1856-2-0x0000000074DA0000-0x0000000074DCF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1936 1856 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1856 4608 rundll32.exe 82 PID 4608 wrote to memory of 1856 4608 rundll32.exe 82 PID 4608 wrote to memory of 1856 4608 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_267641e1e3454a8fc90815b8c8a69f07b05ccab24b11a9978deae96f1a4cdd84.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_267641e1e3454a8fc90815b8c8a69f07b05ccab24b11a9978deae96f1a4cdd84.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 6163⤵
- Program crash
PID:1936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1856 -ip 18561⤵PID:2528