Analysis
-
max time kernel
22s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e08ab65311fd36c51442f18b7e9f327d1cdfcfbaba0a0659ea3ed625020f00f.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_0e08ab65311fd36c51442f18b7e9f327d1cdfcfbaba0a0659ea3ed625020f00f.dll
-
Size
188KB
-
MD5
6d9b8a9a916a97bd041f4c1727e2ebd0
-
SHA1
beba7cfd7ac84e589bc543a141741f6ad580dd53
-
SHA256
0e08ab65311fd36c51442f18b7e9f327d1cdfcfbaba0a0659ea3ed625020f00f
-
SHA512
8636020f38354d867dea4aadb3720d783cb91a84fbb13b61a85a2366e50faacb108bcce495f7f61b2af5147f1ffb8cbb6ff19bd298b0ece0fa98df3ff0e77d60
-
SSDEEP
3072:tA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo+o:tzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2296-1-0x0000000074C20000-0x0000000074C50000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2296 2220 rundll32.exe 29 PID 2220 wrote to memory of 2296 2220 rundll32.exe 29 PID 2220 wrote to memory of 2296 2220 rundll32.exe 29 PID 2220 wrote to memory of 2296 2220 rundll32.exe 29 PID 2220 wrote to memory of 2296 2220 rundll32.exe 29 PID 2220 wrote to memory of 2296 2220 rundll32.exe 29 PID 2220 wrote to memory of 2296 2220 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e08ab65311fd36c51442f18b7e9f327d1cdfcfbaba0a0659ea3ed625020f00f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e08ab65311fd36c51442f18b7e9f327d1cdfcfbaba0a0659ea3ed625020f00f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2296
-