Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_16fedf200ff8864e5c3faaf5507bbaf507e683f7764ec2a6a608d6cdcf56dcc4.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_16fedf200ff8864e5c3faaf5507bbaf507e683f7764ec2a6a608d6cdcf56dcc4.dll
-
Size
178KB
-
MD5
ca05d15d88beb6fa54a2c9b88d1e763b
-
SHA1
345ef7802f1d5f375b5e86c780e212c6f031a1b9
-
SHA256
16fedf200ff8864e5c3faaf5507bbaf507e683f7764ec2a6a608d6cdcf56dcc4
-
SHA512
245fcf4ba31cce1fdc569680d29567f3bb91f57222feba00aca088edbddc29635c281360c67d32f59586917361a4cda151d4a9b4a3fa7f3c8c2d77845530ea34
-
SSDEEP
3072:jZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtlUucGZ2:jUAk9I4vgz/V2dulz6/hvOhG
Malware Config
Extracted
dridex
22201
142.93.223.149:443
128.199.36.62:4664
50.116.54.215:13786
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2772-1-0x0000000074780000-0x00000000747B1000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2772 1064 rundll32.exe 30 PID 1064 wrote to memory of 2772 1064 rundll32.exe 30 PID 1064 wrote to memory of 2772 1064 rundll32.exe 30 PID 1064 wrote to memory of 2772 1064 rundll32.exe 30 PID 1064 wrote to memory of 2772 1064 rundll32.exe 30 PID 1064 wrote to memory of 2772 1064 rundll32.exe 30 PID 1064 wrote to memory of 2772 1064 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16fedf200ff8864e5c3faaf5507bbaf507e683f7764ec2a6a608d6cdcf56dcc4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16fedf200ff8864e5c3faaf5507bbaf507e683f7764ec2a6a608d6cdcf56dcc4.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2772
-