Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 18:36 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636.dll
-
Size
428KB
-
MD5
d09fdc8c70d4c21d616b5911a05400ae
-
SHA1
2d627f24c763d1a74b562fa8fab65eee4e98829e
-
SHA256
ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636
-
SHA512
a0ce0d71e0a92125dffa2596a84dbb732813bf6e6ed403ff0e5b0b0f43384da326c97d4db9d85e55b2d9a222da24bf10759ee27c2afb6af939ddccde9fb6a768
-
SSDEEP
12288:nOlKg7NdfHE6ZY3RiuBl/2V5HYB6GWr7RXieK7ho3Q4BA3F5fYPaI2D4+U8P4RI:n+Ky7fHE6ZY3RiuBl/2V5HYB6GWr7RXG
Malware Config
Extracted
dridex
22202
67.207.95.35:443
86.107.98.232:8333
188.165.214.166:4664
144.91.110.219:9217
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3748-1-0x0000000075270000-0x00000000752DD000-memory.dmp dridex_ldr behavioral2/memory/3748-2-0x0000000075270000-0x00000000752DD000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 232 3748 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1124 wrote to memory of 3748 1124 rundll32.exe 83 PID 1124 wrote to memory of 3748 1124 rundll32.exe 83 PID 1124 wrote to memory of 3748 1124 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 6643⤵
- Program crash
PID:232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3748 -ip 37481⤵PID:212
Network
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request2.36.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.36.159.162.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request2.36.159.162.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTR
-
Remote address:8.8.8.8:53Request6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTR
-
Remote address:8.8.8.8:53Request6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTR
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTR
-
355 B 157 B 5 1
DNS Request
2.159.190.20.in-addr.arpa
DNS Request
2.159.190.20.in-addr.arpa
DNS Request
2.159.190.20.in-addr.arpa
DNS Request
2.159.190.20.in-addr.arpa
DNS Request
2.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
210 B 156 B 3 1
DNS Request
50.23.12.20.in-addr.arpa
DNS Request
50.23.12.20.in-addr.arpa
DNS Request
50.23.12.20.in-addr.arpa
-
213 B 133 B 3 1
DNS Request
2.36.159.162.in-addr.arpa
DNS Request
2.36.159.162.in-addr.arpa
DNS Request
2.36.159.162.in-addr.arpa
-
472 B 204 B 4 1
DNS Request
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
DNS Request
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
DNS Request
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
DNS Request
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
-
144 B 158 B 2 1
DNS Request
19.229.111.52.in-addr.arpa
DNS Request
19.229.111.52.in-addr.arpa
-
280 B 133 B 4 1
DNS Request
73.144.22.2.in-addr.arpa
DNS Request
73.144.22.2.in-addr.arpa
DNS Request
73.144.22.2.in-addr.arpa
DNS Request
73.144.22.2.in-addr.arpa