Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ebdb7e4e17434112d8b7bbc5855a9652538e7c112735bcaeed4f987f8c5aff08.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ebdb7e4e17434112d8b7bbc5855a9652538e7c112735bcaeed4f987f8c5aff08.dll
-
Size
184KB
-
MD5
32cb9a6db32c6e1c9185a1ab6b046a06
-
SHA1
449fafcda6ead6aa4c0d0e2fc94bd2cb2ef12305
-
SHA256
ebdb7e4e17434112d8b7bbc5855a9652538e7c112735bcaeed4f987f8c5aff08
-
SHA512
9f6ac1a4efd8c307066a18541731a7330b2a6c1061f7e8ea58262035427f4ee3a2c2f0c4fd1b487f388c4468d7c6600bea215a57ae9102bcdac19085db29392a
-
SSDEEP
3072:YiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoulzoxss7:YiLVCIT4WK2z1W+CUHZj4Skq/eaosoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4432-1-0x0000000074A70000-0x0000000074A9F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2956 4432 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 4432 412 rundll32.exe 83 PID 412 wrote to memory of 4432 412 rundll32.exe 83 PID 412 wrote to memory of 4432 412 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ebdb7e4e17434112d8b7bbc5855a9652538e7c112735bcaeed4f987f8c5aff08.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ebdb7e4e17434112d8b7bbc5855a9652538e7c112735bcaeed4f987f8c5aff08.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 6163⤵
- Program crash
PID:2956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4432 -ip 44321⤵PID:5092