Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394.dll
-
Size
161KB
-
MD5
fea64190f9e06aaa77a72766b83bdcc1
-
SHA1
67ef2c6dc9cef833dad5c7ac556cf723fbcd7e22
-
SHA256
15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394
-
SHA512
5749186b35cdeba9379bbc6f7650ed0d251ec16bde33304fcb6a4bdd14f82bfdddcc0dca5501e8310f8328e5c0497a123b4bcfbf9a13aadbca09782a4b3761e7
-
SSDEEP
3072:Hk2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/Yp8AF:1G3rUvoU4JE/Wzan9T7B/CKsL/Yy
Malware Config
Extracted
dridex
40112
193.200.130.181:443
95.138.161.226:2303
167.114.113.13:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2336-0-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2336 2084 rundll32.exe 30 PID 2084 wrote to memory of 2336 2084 rundll32.exe 30 PID 2084 wrote to memory of 2336 2084 rundll32.exe 30 PID 2084 wrote to memory of 2336 2084 rundll32.exe 30 PID 2084 wrote to memory of 2336 2084 rundll32.exe 30 PID 2084 wrote to memory of 2336 2084 rundll32.exe 30 PID 2084 wrote to memory of 2336 2084 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2336
-