Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ab0fbdc6c1b772097c896316fa9cdb5ba87c10636a49637aa55d215914c420ef.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ab0fbdc6c1b772097c896316fa9cdb5ba87c10636a49637aa55d215914c420ef.dll
-
Size
184KB
-
MD5
7b2916ae0c02cbb0b006c80e743495c8
-
SHA1
3e7945d37ce3c6e08bcd1c5cb692b53ad6d15561
-
SHA256
ab0fbdc6c1b772097c896316fa9cdb5ba87c10636a49637aa55d215914c420ef
-
SHA512
01bb8889f43209802482e5a1efe97e81a36e2b927b35db5cf5dec7d5dde9eb2bca2d7853a45e547289684dc69be678ecc538e3407801667bdc65c07d064312ad
-
SSDEEP
3072:8iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoulzoxss7:8iLVCIT4WK2z1W+CUHZj4Skq/eaosoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2420-1-0x0000000075410000-0x000000007543F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1900 2420 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2420 2404 rundll32.exe 28 PID 2404 wrote to memory of 2420 2404 rundll32.exe 28 PID 2404 wrote to memory of 2420 2404 rundll32.exe 28 PID 2404 wrote to memory of 2420 2404 rundll32.exe 28 PID 2404 wrote to memory of 2420 2404 rundll32.exe 28 PID 2404 wrote to memory of 2420 2404 rundll32.exe 28 PID 2404 wrote to memory of 2420 2404 rundll32.exe 28 PID 2420 wrote to memory of 1900 2420 rundll32.exe 29 PID 2420 wrote to memory of 1900 2420 rundll32.exe 29 PID 2420 wrote to memory of 1900 2420 rundll32.exe 29 PID 2420 wrote to memory of 1900 2420 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab0fbdc6c1b772097c896316fa9cdb5ba87c10636a49637aa55d215914c420ef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab0fbdc6c1b772097c896316fa9cdb5ba87c10636a49637aa55d215914c420ef.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2203⤵
- Program crash
PID:1900
-
-