Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_95efea604b9a2c15e9019692e40f9ccd044dbb37b4dec1c1b41373c6368cc4ae.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_95efea604b9a2c15e9019692e40f9ccd044dbb37b4dec1c1b41373c6368cc4ae.dll
-
Size
184KB
-
MD5
2857cbc1bd1a73af3df916cd14f833e9
-
SHA1
f35b3fb0bd3449eb684d2edf0aafdfee56ce8181
-
SHA256
95efea604b9a2c15e9019692e40f9ccd044dbb37b4dec1c1b41373c6368cc4ae
-
SHA512
a58627429a0b4928b1537e43587f06031bcfde2b7c51cdc5d954dc2e0822c2585312c9a701cdaf2f71e74560f60ea8dd1ec4b8a34f66ff385c0ea55e67cd89dc
-
SSDEEP
3072:5gkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdg2dA4l:gPFkq6zOe5ilSanOZd
Malware Config
Extracted
dridex
22201
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2420-1-0x0000000074B70000-0x0000000074BA0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2424 2420 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2420 wrote to memory of 2424 2420 rundll32.exe 32 PID 2420 wrote to memory of 2424 2420 rundll32.exe 32 PID 2420 wrote to memory of 2424 2420 rundll32.exe 32 PID 2420 wrote to memory of 2424 2420 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95efea604b9a2c15e9019692e40f9ccd044dbb37b4dec1c1b41373c6368cc4ae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95efea604b9a2c15e9019692e40f9ccd044dbb37b4dec1c1b41373c6368cc4ae.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2203⤵
- Program crash
PID:2424
-
-