Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c5a65d3d5c11eccd4fbfd7f6cba25bc1d1ddedb6ad6883d1f057ebdfbadd6bbb.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_c5a65d3d5c11eccd4fbfd7f6cba25bc1d1ddedb6ad6883d1f057ebdfbadd6bbb.dll
-
Size
184KB
-
MD5
02e2132134d61a9153957f84f2b35bea
-
SHA1
8096d89f5e730ace83da9b7c0ce38c6d7b82aa2f
-
SHA256
c5a65d3d5c11eccd4fbfd7f6cba25bc1d1ddedb6ad6883d1f057ebdfbadd6bbb
-
SHA512
e1b9af9c3d9bee2c46a56e1e2aa14ea9d9f3b48ce9ae9908c2dace2690b1fbee3d5cd07aa29af22451fa23b0085ee6d610304096140943f9894d12dc8f2a506c
-
SSDEEP
3072:IiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoplzoxss7:IiLVCIT4WK2z1W+CUHZj4Skq/eao3oC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4844-1-0x00000000755E0000-0x000000007560F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2796 4844 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3216 wrote to memory of 4844 3216 rundll32.exe 83 PID 3216 wrote to memory of 4844 3216 rundll32.exe 83 PID 3216 wrote to memory of 4844 3216 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c5a65d3d5c11eccd4fbfd7f6cba25bc1d1ddedb6ad6883d1f057ebdfbadd6bbb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c5a65d3d5c11eccd4fbfd7f6cba25bc1d1ddedb6ad6883d1f057ebdfbadd6bbb.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 6163⤵
- Program crash
PID:2796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4844 -ip 48441⤵PID:3520