Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2024, 17:28 UTC

General

  • Target

    JaffaCakes118_0e6b69eeec038c7f518a2559f852fa7b49debf0acf5b1aac907faf0e00af0cc4.dll

  • Size

    164KB

  • MD5

    d9f8af20024b755e11ae5366d0c15edd

  • SHA1

    283f18c8fed4841610463eb02f2d20843f637cb6

  • SHA256

    0e6b69eeec038c7f518a2559f852fa7b49debf0acf5b1aac907faf0e00af0cc4

  • SHA512

    f72775cc28861093e2eae5dd37e3f2db8588bc7e4f0bbe3e3c72f06439f3597bb6480ffee7879c7657fc825d71b0e0e30e20eb3e60bef55053a53dc1c5a67de0

  • SSDEEP

    3072:cBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:cBefiv/12+2A1AIpFzxCtNjHSoPm11J

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.123.40.54:443

82.209.17.209:8172

180.250.21.2:13721

rc4.plain
1
16dkGStOzdHgjuCciXGdSX7UrHWfYSUG8wEUtKNgzHrWMfTGafJbC
rc4.plain
1
LSmLqiu4RhIlqDaeFozmGve4OMNyowuZCr82x9MNf9gP2L7B1Hk3B

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e6b69eeec038c7f518a2559f852fa7b49debf0acf5b1aac907faf0e00af0cc4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e6b69eeec038c7f518a2559f852fa7b49debf0acf5b1aac907faf0e00af0cc4.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 236
        3⤵
        • Program crash
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-0-0x0000000000190000-0x0000000000196000-memory.dmp

    Filesize

    24KB

  • memory/1940-1-0x0000000010000000-0x000000001002F000-memory.dmp

    Filesize

    188KB

  • memory/1940-3-0x0000000000190000-0x0000000000196000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.