Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9ab2ae676530552d1887a20bbc8210db393263cfaf3ea76837c318757abc0101.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_9ab2ae676530552d1887a20bbc8210db393263cfaf3ea76837c318757abc0101.dll
-
Size
184KB
-
MD5
10c70f9ca45026232d4fa8b79bf32625
-
SHA1
109a1aa5f882c1c09c20d7dddec94d95e3d0c9f6
-
SHA256
9ab2ae676530552d1887a20bbc8210db393263cfaf3ea76837c318757abc0101
-
SHA512
5178fb02bc98be739344d82cdc6e7d2f6ecd37be410a772b895333815067739a884fb2ec1e667bbbb875d2875c8beb85f14f88d4e1d590845b9c2df0471da21b
-
SSDEEP
3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoAlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eao+oC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1916-1-0x0000000074C80000-0x0000000074CAF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2244 1916 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1916 2340 rundll32.exe 31 PID 2340 wrote to memory of 1916 2340 rundll32.exe 31 PID 2340 wrote to memory of 1916 2340 rundll32.exe 31 PID 2340 wrote to memory of 1916 2340 rundll32.exe 31 PID 2340 wrote to memory of 1916 2340 rundll32.exe 31 PID 2340 wrote to memory of 1916 2340 rundll32.exe 31 PID 2340 wrote to memory of 1916 2340 rundll32.exe 31 PID 1916 wrote to memory of 2244 1916 rundll32.exe 32 PID 1916 wrote to memory of 2244 1916 rundll32.exe 32 PID 1916 wrote to memory of 2244 1916 rundll32.exe 32 PID 1916 wrote to memory of 2244 1916 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9ab2ae676530552d1887a20bbc8210db393263cfaf3ea76837c318757abc0101.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9ab2ae676530552d1887a20bbc8210db393263cfaf3ea76837c318757abc0101.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 2203⤵
- Program crash
PID:2244
-
-