Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8328c4418a57e8f812f22010926f300e19c648460f93f9aa4cda4b5a1fffd413.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8328c4418a57e8f812f22010926f300e19c648460f93f9aa4cda4b5a1fffd413.dll
-
Size
184KB
-
MD5
58490745bb881d6254f024bdcd15daee
-
SHA1
79aab0eb1f8034460310eead7b39525ca3a0a9e2
-
SHA256
8328c4418a57e8f812f22010926f300e19c648460f93f9aa4cda4b5a1fffd413
-
SHA512
1c9f8fddc37c4a20963763b6bab7a5e8b2bb7217aeb184c3af688b9330f5d59334e37516aa450b45e5ac12aae5d1cf42722199c2b2636524017452e0e4c40045
-
SSDEEP
3072:uiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoElzoxss7:uiLVCIT4WK2z1W+CUHZj4Skq/eao6oC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2056-1-0x0000000074990000-0x00000000749BF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2244 2056 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2056 2584 rundll32.exe 30 PID 2584 wrote to memory of 2056 2584 rundll32.exe 30 PID 2584 wrote to memory of 2056 2584 rundll32.exe 30 PID 2584 wrote to memory of 2056 2584 rundll32.exe 30 PID 2584 wrote to memory of 2056 2584 rundll32.exe 30 PID 2584 wrote to memory of 2056 2584 rundll32.exe 30 PID 2584 wrote to memory of 2056 2584 rundll32.exe 30 PID 2056 wrote to memory of 2244 2056 rundll32.exe 32 PID 2056 wrote to memory of 2244 2056 rundll32.exe 32 PID 2056 wrote to memory of 2244 2056 rundll32.exe 32 PID 2056 wrote to memory of 2244 2056 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8328c4418a57e8f812f22010926f300e19c648460f93f9aa4cda4b5a1fffd413.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8328c4418a57e8f812f22010926f300e19c648460f93f9aa4cda4b5a1fffd413.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 2203⤵
- Program crash
PID:2244
-
-