Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fab3d0d6e45538d2518474acabdcb84ea841e16c67a29052d78c30e9ae361e32.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_fab3d0d6e45538d2518474acabdcb84ea841e16c67a29052d78c30e9ae361e32.dll
-
Size
188KB
-
MD5
65eb9bbc393896b779e42a45f2d2956f
-
SHA1
b6d5135e05be280374076b17c9c3393b8deea70d
-
SHA256
fab3d0d6e45538d2518474acabdcb84ea841e16c67a29052d78c30e9ae361e32
-
SHA512
59d68f82893ea43025dd02ef49b2a31397b9061dc098cf396f724094d3e867fe073fa0f4e8947d036d98a1424ac4ccadf1206c5c6997525e41d5a03a56a28359
-
SSDEEP
3072:2teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzZ9qM:+q7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2220-0-0x0000000074C90000-0x0000000074CC0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2140 2220 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2220 2824 rundll32.exe 30 PID 2824 wrote to memory of 2220 2824 rundll32.exe 30 PID 2824 wrote to memory of 2220 2824 rundll32.exe 30 PID 2824 wrote to memory of 2220 2824 rundll32.exe 30 PID 2824 wrote to memory of 2220 2824 rundll32.exe 30 PID 2824 wrote to memory of 2220 2824 rundll32.exe 30 PID 2824 wrote to memory of 2220 2824 rundll32.exe 30 PID 2220 wrote to memory of 2140 2220 rundll32.exe 31 PID 2220 wrote to memory of 2140 2220 rundll32.exe 31 PID 2220 wrote to memory of 2140 2220 rundll32.exe 31 PID 2220 wrote to memory of 2140 2220 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fab3d0d6e45538d2518474acabdcb84ea841e16c67a29052d78c30e9ae361e32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fab3d0d6e45538d2518474acabdcb84ea841e16c67a29052d78c30e9ae361e32.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 3003⤵
- Program crash
PID:2140
-
-