Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1.dll
-
Size
184KB
-
MD5
9ff430322335bd3d1b0b4299b0b7e2c5
-
SHA1
89dad42c05a79ddbf26c63723f5363f1e387285a
-
SHA256
2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1
-
SHA512
3e6f3e9881509547e69486994e110d241acba076b42b2e9063730269a0b3b5127fb2970377837a67926406fdcbadac1493e327952c0d7800d872f84b033fd2ba
-
SSDEEP
3072:suwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4K4lmsb:y7TXYsd9SkONU1jKGlflm
Malware Config
Extracted
dridex
22202
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4240-1-0x0000000075610000-0x0000000075640000-memory.dmp dridex_ldr behavioral2/memory/4240-2-0x0000000075610000-0x0000000075640000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 5008 4240 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4240 2924 rundll32.exe 82 PID 2924 wrote to memory of 4240 2924 rundll32.exe 82 PID 2924 wrote to memory of 4240 2924 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 6163⤵
- Program crash
PID:5008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4240 -ip 42401⤵PID:380