Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_96bb327a6f9fb5fc0446d121fcfce7ac32307702f8e0a021cfee1756bc70ae7c.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_96bb327a6f9fb5fc0446d121fcfce7ac32307702f8e0a021cfee1756bc70ae7c.dll
-
Size
184KB
-
MD5
4759ec4824483c2667476cdf7e9248a2
-
SHA1
8e0291b5567a9524a3b140b522c59fc7b415c877
-
SHA256
96bb327a6f9fb5fc0446d121fcfce7ac32307702f8e0a021cfee1756bc70ae7c
-
SHA512
47f1dfa671ba99fa311e4d649207ba000775befb2162ecc9bc9c06d7862c803c6f8c50ff12ecd19f8cb507a948e2c9467e5d8b38fe4cc0c4aece2185e02dc5fe
-
SSDEEP
3072:kuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4Kulmsb:67TXYsd9SkONU1jKGlBlm
Malware Config
Extracted
dridex
22202
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4464-1-0x0000000075500000-0x0000000075530000-memory.dmp dridex_ldr behavioral2/memory/4464-2-0x0000000075500000-0x0000000075530000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4916 4464 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1940 wrote to memory of 4464 1940 rundll32.exe 83 PID 1940 wrote to memory of 4464 1940 rundll32.exe 83 PID 1940 wrote to memory of 4464 1940 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96bb327a6f9fb5fc0446d121fcfce7ac32307702f8e0a021cfee1756bc70ae7c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96bb327a6f9fb5fc0446d121fcfce7ac32307702f8e0a021cfee1756bc70ae7c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 6163⤵
- Program crash
PID:4916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4464 -ip 44641⤵PID:3180