Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9dc55065a6bd43affe09b355c0c83ba5db720117e1315aa61a8d2958697340e2.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_9dc55065a6bd43affe09b355c0c83ba5db720117e1315aa61a8d2958697340e2.dll
-
Size
184KB
-
MD5
f3acab80ed93164c82bba8ab15ec3780
-
SHA1
290fb21fd6431c2331e18cb252b172da86f8b735
-
SHA256
9dc55065a6bd43affe09b355c0c83ba5db720117e1315aa61a8d2958697340e2
-
SHA512
edd4278dc09e3072d819b0392ba31f17c25c8c84b1a62e2ce10d6372080f8bcaac2875a8692774ee79352261075f7fee4522387a8fa9500c231249e6231e340e
-
SSDEEP
3072:wiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoElzoxss7:wiLVCIT4WK2z1W+CUHZj4Skq/eao6oC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4716-1-0x0000000074BE0000-0x0000000074C0F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1416 4716 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2544 wrote to memory of 4716 2544 rundll32.exe 83 PID 2544 wrote to memory of 4716 2544 rundll32.exe 83 PID 2544 wrote to memory of 4716 2544 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dc55065a6bd43affe09b355c0c83ba5db720117e1315aa61a8d2958697340e2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dc55065a6bd43affe09b355c0c83ba5db720117e1315aa61a8d2958697340e2.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 6163⤵
- Program crash
PID:1416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4716 -ip 47161⤵PID:4760