Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2163795ec8af0309956dbf6c9ad0959d6205de91ca3bfa60602b5f7625e78620.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2163795ec8af0309956dbf6c9ad0959d6205de91ca3bfa60602b5f7625e78620.dll
-
Size
161KB
-
MD5
626f622e9d9824c60197529cf9a97407
-
SHA1
7ebc486e082f09c22b8d4079ea4842137a535e1f
-
SHA256
2163795ec8af0309956dbf6c9ad0959d6205de91ca3bfa60602b5f7625e78620
-
SHA512
0867ebcb18e6e08af4d2762bea06dfa62c695bb3340b6b53caa084eb6de03c7ac2c6b1879877c3bb8ae8a005e7628d2474f115ee5fec7e6c073da76963cefd59
-
SSDEEP
3072:R1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2wGkFY:rnS62Fl+pkeJl3CvRStrFl+EYh
Malware Config
Extracted
dridex
22202
78.46.73.125:443
185.148.168.26:2303
66.113.160.126:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3656-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr behavioral2/memory/3656-2-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4248 3656 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3656 4448 rundll32.exe 82 PID 4448 wrote to memory of 3656 4448 rundll32.exe 82 PID 4448 wrote to memory of 3656 4448 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2163795ec8af0309956dbf6c9ad0959d6205de91ca3bfa60602b5f7625e78620.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2163795ec8af0309956dbf6c9ad0959d6205de91ca3bfa60602b5f7625e78620.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 7123⤵
- Program crash
PID:4248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3656 -ip 36561⤵PID:5092