Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_98d8c81f7e146d1005c32f800bc78a321be0b4d78df86ef8d912a45bbd447692.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_98d8c81f7e146d1005c32f800bc78a321be0b4d78df86ef8d912a45bbd447692.dll
-
Size
188KB
-
MD5
f4547aab127ee7c82e04e46b7be1b436
-
SHA1
7f95bc8c1054a8b10e0f643dc534b027ecc1d042
-
SHA256
98d8c81f7e146d1005c32f800bc78a321be0b4d78df86ef8d912a45bbd447692
-
SHA512
5a2b7c0ed7fb028263a2c63d3542f11e8c4b61cbe6dfca3eae5a835f8d7ef6fa57ce7952a6b3a6a1995972f75115c0f7b9a4cb5d57b4c45aa5f0e44783191b21
-
SSDEEP
3072:zteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzo9qM:7q7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2108-1-0x0000000075360000-0x0000000075390000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2364 2108 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2108 2684 rundll32.exe 30 PID 2684 wrote to memory of 2108 2684 rundll32.exe 30 PID 2684 wrote to memory of 2108 2684 rundll32.exe 30 PID 2684 wrote to memory of 2108 2684 rundll32.exe 30 PID 2684 wrote to memory of 2108 2684 rundll32.exe 30 PID 2684 wrote to memory of 2108 2684 rundll32.exe 30 PID 2684 wrote to memory of 2108 2684 rundll32.exe 30 PID 2108 wrote to memory of 2364 2108 rundll32.exe 32 PID 2108 wrote to memory of 2364 2108 rundll32.exe 32 PID 2108 wrote to memory of 2364 2108 rundll32.exe 32 PID 2108 wrote to memory of 2364 2108 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98d8c81f7e146d1005c32f800bc78a321be0b4d78df86ef8d912a45bbd447692.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98d8c81f7e146d1005c32f800bc78a321be0b4d78df86ef8d912a45bbd447692.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 3003⤵
- Program crash
PID:2364
-
-