Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4d8aa5bf0d9bd578360594fe0fa0a5ac796645dfe960d790422b90592f29844d.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_4d8aa5bf0d9bd578360594fe0fa0a5ac796645dfe960d790422b90592f29844d.dll
-
Size
184KB
-
MD5
e379ed926f4ca671f5a28e4a55fc31fe
-
SHA1
75d6d408b1226df623e7b2ef6caa6b1dfb101d6e
-
SHA256
4d8aa5bf0d9bd578360594fe0fa0a5ac796645dfe960d790422b90592f29844d
-
SHA512
73d0f5182d45dfae6e5570ff5ad21e18e8158bf8e843c58366c77646d01b5bfb97b86be2552b5c317f73502b0420dcaae23a14a1272f4a78b6536af2d84eb92a
-
SSDEEP
3072:XiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoPlzoxss7:XiLVCIT4WK2z1W+CUHZj4Skq/eaoNoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/448-1-0x0000000075550000-0x000000007557F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1948 448 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 676 wrote to memory of 448 676 rundll32.exe 83 PID 676 wrote to memory of 448 676 rundll32.exe 83 PID 676 wrote to memory of 448 676 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d8aa5bf0d9bd578360594fe0fa0a5ac796645dfe960d790422b90592f29844d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d8aa5bf0d9bd578360594fe0fa0a5ac796645dfe960d790422b90592f29844d.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 6163⤵
- Program crash
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 448 -ip 4481⤵PID:3708