Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0522d04e7285bb7114f249b83033892bdd03b80b1fa6281c3b4cb99bb2873c35.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_0522d04e7285bb7114f249b83033892bdd03b80b1fa6281c3b4cb99bb2873c35.dll
-
Size
184KB
-
MD5
5ce4759451cf4a08308609f5a23a8459
-
SHA1
f788b171cd4ccdc50fcdd2ceec31d3faf9a87eec
-
SHA256
0522d04e7285bb7114f249b83033892bdd03b80b1fa6281c3b4cb99bb2873c35
-
SHA512
356437f789d31a5da4ed715773ee1cb30ac0dc39d012c52fde84db4877d07f47e8f32160e3c6601ef37340ee90525c1b0d2eb84a4ec78c05592168406252e672
-
SSDEEP
3072:TuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KNlmsb:h7TXYsd9SkONU1jKGlSlm
Malware Config
Extracted
dridex
22202
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/2068-1-0x00000000751F0000-0x0000000075220000-memory.dmp dridex_ldr behavioral2/memory/2068-2-0x00000000751F0000-0x0000000075220000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1456 2068 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2068 2176 rundll32.exe 82 PID 2176 wrote to memory of 2068 2176 rundll32.exe 82 PID 2176 wrote to memory of 2068 2176 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0522d04e7285bb7114f249b83033892bdd03b80b1fa6281c3b4cb99bb2873c35.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0522d04e7285bb7114f249b83033892bdd03b80b1fa6281c3b4cb99bb2873c35.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 6163⤵
- Program crash
PID:1456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2068 -ip 20681⤵PID:3460