Analysis
-
max time kernel
92s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c46a1326960f0eff1a746c8fcb99af468ed7a499559c8058df9a872b2216e74b.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_c46a1326960f0eff1a746c8fcb99af468ed7a499559c8058df9a872b2216e74b.dll
-
Size
163KB
-
MD5
3200223ed8b4412b9ce00507be7a86dd
-
SHA1
8c1ef20af0ffd6d1d35ab0abf8056239feca7955
-
SHA256
c46a1326960f0eff1a746c8fcb99af468ed7a499559c8058df9a872b2216e74b
-
SHA512
2e9604adad9f0af97aef8d9e41d05db66bfa3af04c7793370375b70b4d8116646ed93c8823b0ffc7ad2c96d97d868cfaf9acbc045b9970a1dfb9119a958b42ee
-
SSDEEP
3072:y9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:y9F6rQXvFczvYpQP
Malware Config
Extracted
dridex
22201
43.229.206.212:443
82.209.17.209:8172
162.241.209.225:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/804-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4736 804 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 804 3016 rundll32.exe 83 PID 3016 wrote to memory of 804 3016 rundll32.exe 83 PID 3016 wrote to memory of 804 3016 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c46a1326960f0eff1a746c8fcb99af468ed7a499559c8058df9a872b2216e74b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c46a1326960f0eff1a746c8fcb99af468ed7a499559c8058df9a872b2216e74b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 7083⤵
- Program crash
PID:4736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 804 -ip 8041⤵PID:2660