Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_17b51ffd5731f95d9463ade0d5a58eeb3065846f57c894b5dd441e402f7a67a0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_17b51ffd5731f95d9463ade0d5a58eeb3065846f57c894b5dd441e402f7a67a0.dll
-
Size
184KB
-
MD5
3772e6752142b05dff8cb8747229e50b
-
SHA1
98d56982b2edd7fc3a4783f97f54b6ca4e641cf4
-
SHA256
17b51ffd5731f95d9463ade0d5a58eeb3065846f57c894b5dd441e402f7a67a0
-
SHA512
d7b50159865a073753e3f100ccee6c658b5fb0bd0efba0c77fb0ba9b7acdc4e15ee0dabf2ca5731a51dff8da3a8b55b20ea4225de89791a1b255e12a0ad7335a
-
SSDEEP
3072:LiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoflzoxss7:LiLVCIT4WK2z1W+CUHZj4Skq/eao9oC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1696-1-0x0000000074B90000-0x0000000074BBF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2084 1696 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1696 wrote to memory of 2084 1696 rundll32.exe 32 PID 1696 wrote to memory of 2084 1696 rundll32.exe 32 PID 1696 wrote to memory of 2084 1696 rundll32.exe 32 PID 1696 wrote to memory of 2084 1696 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17b51ffd5731f95d9463ade0d5a58eeb3065846f57c894b5dd441e402f7a67a0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17b51ffd5731f95d9463ade0d5a58eeb3065846f57c894b5dd441e402f7a67a0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 2203⤵
- Program crash
PID:2084
-
-