Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f33d9fb3b40cac82a7c8d32972096889b7fd63d39437fb148d6de5be5a5f1604.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_f33d9fb3b40cac82a7c8d32972096889b7fd63d39437fb148d6de5be5a5f1604.dll
-
Size
163KB
-
MD5
47a48ea9a988201ea4345055d7e34b1a
-
SHA1
8b4362f48fcc9aa2e10bda4466700025507cf58c
-
SHA256
f33d9fb3b40cac82a7c8d32972096889b7fd63d39437fb148d6de5be5a5f1604
-
SHA512
fced6c5a2796f4ae406589a87d45783bb3126139296063e62531763de873ec3c2b881373c7b149e91f5953efd144e94ac78f7784428a4682d9c88bd951f30723
-
SSDEEP
3072:m9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:m9F6rQXvFczvYpQP
Malware Config
Extracted
dridex
22201
43.229.206.212:443
82.209.17.209:8172
162.241.209.225:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/1476-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1708 1476 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 1476 4296 rundll32.exe 83 PID 4296 wrote to memory of 1476 4296 rundll32.exe 83 PID 4296 wrote to memory of 1476 4296 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f33d9fb3b40cac82a7c8d32972096889b7fd63d39437fb148d6de5be5a5f1604.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f33d9fb3b40cac82a7c8d32972096889b7fd63d39437fb148d6de5be5a5f1604.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 7083⤵
- Program crash
PID:1708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1476 -ip 14761⤵PID:4560