Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d86599b0cb63e99b123e5f2586870a57a443c7d8414a0b56449987ed1f99efc1.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d86599b0cb63e99b123e5f2586870a57a443c7d8414a0b56449987ed1f99efc1.dll
-
Size
160KB
-
MD5
e141ccdf46400ff87d2dc92fffb5a04e
-
SHA1
af64138ceb46a05fff3fab8fdb3119de445fd010
-
SHA256
d86599b0cb63e99b123e5f2586870a57a443c7d8414a0b56449987ed1f99efc1
-
SHA512
1285193dba0a1f6013f53db3325a35bd288eb5109161d97bd87ba5ccf7e9a4116d1fcca61aaf23be0bb77d241f9b744969e58ffe502ec7cb734e3abba66883bf
-
SSDEEP
3072:dM5RgjZh7gpk57/MbVelsxoNTen1v/HuxbIXU89J3WgMh8zH6:+52j4pk5zMbVO6/HUIXU8KgMyz
Malware Config
Extracted
dridex
40111
188.226.199.7:443
46.101.216.218:8172
178.254.33.197:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2272-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2272 1860 rundll32.exe 28 PID 1860 wrote to memory of 2272 1860 rundll32.exe 28 PID 1860 wrote to memory of 2272 1860 rundll32.exe 28 PID 1860 wrote to memory of 2272 1860 rundll32.exe 28 PID 1860 wrote to memory of 2272 1860 rundll32.exe 28 PID 1860 wrote to memory of 2272 1860 rundll32.exe 28 PID 1860 wrote to memory of 2272 1860 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d86599b0cb63e99b123e5f2586870a57a443c7d8414a0b56449987ed1f99efc1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d86599b0cb63e99b123e5f2586870a57a443c7d8414a0b56449987ed1f99efc1.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2272
-