Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 11:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fa4d27f974e0e818166cb382c359a2162562aa8e8f137fa20a670d58e7f2a6af.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_fa4d27f974e0e818166cb382c359a2162562aa8e8f137fa20a670d58e7f2a6af.dll
-
Size
171KB
-
MD5
998d04048f8a6a24d3aa6ddd5d1a17dc
-
SHA1
c4e073d40b216cbd05b89e3925188dcd1ac4aa6d
-
SHA256
fa4d27f974e0e818166cb382c359a2162562aa8e8f137fa20a670d58e7f2a6af
-
SHA512
c32f4826c659feecf3987a8f71fb96f39e9ae70c961fc356bfafb3f00a7e44da8794cd8560a81b68b9139385a769584e43be804e19ad48e5da342951aab99a5b
-
SSDEEP
3072:Mi49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:MH9RVaPEmsdHdbQUbd2H3
Malware Config
Extracted
dridex
22201
128.199.200.38:443
192.163.233.216:6601
43.229.206.244:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/2392-1-0x00000000758A0000-0x00000000758D0000-memory.dmp dridex_ldr behavioral2/memory/2392-2-0x00000000758A0000-0x00000000758D0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3876 2392 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2392 4952 rundll32.exe 82 PID 4952 wrote to memory of 2392 4952 rundll32.exe 82 PID 4952 wrote to memory of 2392 4952 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fa4d27f974e0e818166cb382c359a2162562aa8e8f137fa20a670d58e7f2a6af.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fa4d27f974e0e818166cb382c359a2162562aa8e8f137fa20a670d58e7f2a6af.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 6723⤵
- Program crash
PID:3876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2392 -ip 23921⤵PID:972