Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b1c4f6191e73ef6eccf25b47b61c66e446d4ef5ac3d63e7f158e183dce489313.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b1c4f6191e73ef6eccf25b47b61c66e446d4ef5ac3d63e7f158e183dce489313.dll
-
Size
184KB
-
MD5
3085b4ebc2f3e46eb9f3d690476164a1
-
SHA1
9c0a347a6256c7e0c4c41d110480adbc9ba4aec8
-
SHA256
b1c4f6191e73ef6eccf25b47b61c66e446d4ef5ac3d63e7f158e183dce489313
-
SHA512
0b9b8830655dc69e32e9a75cc8ca6d66a906eed6125e6d62d5d1c77f7a5b330b31087884dbc36e9d3a4ba62cf9d24844130fdd42787f8e3d8a77361890618961
-
SSDEEP
3072:EiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoKlzoxss7:EiLVCIT4WK2z1W+CUHZj4Skq/eaoAoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3672-1-0x00000000751D0000-0x00000000751FF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1268 3672 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3672 4772 rundll32.exe 85 PID 4772 wrote to memory of 3672 4772 rundll32.exe 85 PID 4772 wrote to memory of 3672 4772 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c4f6191e73ef6eccf25b47b61c66e446d4ef5ac3d63e7f158e183dce489313.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c4f6191e73ef6eccf25b47b61c66e446d4ef5ac3d63e7f158e183dce489313.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 6163⤵
- Program crash
PID:1268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3672 -ip 36721⤵PID:3536