Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_79777b135369f6d18d688eec6d9face5da1d01e3352eae6eef7ef3282145939d.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_79777b135369f6d18d688eec6d9face5da1d01e3352eae6eef7ef3282145939d.dll
-
Size
188KB
-
MD5
41661daf44ab1380b7fc90045653bedb
-
SHA1
7a667904b14c33ae9bafe06980d1de75c0ef7c3b
-
SHA256
79777b135369f6d18d688eec6d9face5da1d01e3352eae6eef7ef3282145939d
-
SHA512
3833b3c1bf00af13b14db3d19042d7bb0b5cedc39c4549491e5fa8e5ae271992d4f660604e475b49302794e42ae02629a3860b3afe46249379a2aa2f4b064932
-
SSDEEP
3072:2teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzy9qM:+q7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2552-1-0x00000000744A0000-0x00000000744D0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2312 2552 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2552 1288 rundll32.exe 30 PID 1288 wrote to memory of 2552 1288 rundll32.exe 30 PID 1288 wrote to memory of 2552 1288 rundll32.exe 30 PID 1288 wrote to memory of 2552 1288 rundll32.exe 30 PID 1288 wrote to memory of 2552 1288 rundll32.exe 30 PID 1288 wrote to memory of 2552 1288 rundll32.exe 30 PID 1288 wrote to memory of 2552 1288 rundll32.exe 30 PID 2552 wrote to memory of 2312 2552 rundll32.exe 32 PID 2552 wrote to memory of 2312 2552 rundll32.exe 32 PID 2552 wrote to memory of 2312 2552 rundll32.exe 32 PID 2552 wrote to memory of 2312 2552 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79777b135369f6d18d688eec6d9face5da1d01e3352eae6eef7ef3282145939d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79777b135369f6d18d688eec6d9face5da1d01e3352eae6eef7ef3282145939d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 3003⤵
- Program crash
PID:2312
-
-