Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_75e4ae933a3f7062889ddb69eda4e6a084eaf24e47ccba09be6a9b76f8077d61.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_75e4ae933a3f7062889ddb69eda4e6a084eaf24e47ccba09be6a9b76f8077d61.dll
-
Size
163KB
-
MD5
6d5cff1a3b958d007435da61d59f467c
-
SHA1
cd3e5839ecc2b81a87389c4ee8daf9385d444d43
-
SHA256
75e4ae933a3f7062889ddb69eda4e6a084eaf24e47ccba09be6a9b76f8077d61
-
SHA512
8fc6350f0721d0efd52443bfd77c7caad31bba97619d7c0781240bca61579f344a299c69abc640f842ece9432cb81a1552da0fefa113cb9f27c3f39b2242be36
-
SSDEEP
3072:w9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:w9F6rQXvFczvYpQP
Malware Config
Extracted
dridex
22201
43.229.206.212:443
82.209.17.209:8172
162.241.209.225:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2240-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2780 2240 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2240 3044 rundll32.exe 30 PID 3044 wrote to memory of 2240 3044 rundll32.exe 30 PID 3044 wrote to memory of 2240 3044 rundll32.exe 30 PID 3044 wrote to memory of 2240 3044 rundll32.exe 30 PID 3044 wrote to memory of 2240 3044 rundll32.exe 30 PID 3044 wrote to memory of 2240 3044 rundll32.exe 30 PID 3044 wrote to memory of 2240 3044 rundll32.exe 30 PID 2240 wrote to memory of 2780 2240 rundll32.exe 31 PID 2240 wrote to memory of 2780 2240 rundll32.exe 31 PID 2240 wrote to memory of 2780 2240 rundll32.exe 31 PID 2240 wrote to memory of 2780 2240 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_75e4ae933a3f7062889ddb69eda4e6a084eaf24e47ccba09be6a9b76f8077d61.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_75e4ae933a3f7062889ddb69eda4e6a084eaf24e47ccba09be6a9b76f8077d61.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2363⤵
- Program crash
PID:2780
-
-