Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b3c3ae90212c0ddb729694b4d6b6f7e51dee9b0a1b4c6cdd2d5c47f3a40aa20e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b3c3ae90212c0ddb729694b4d6b6f7e51dee9b0a1b4c6cdd2d5c47f3a40aa20e.dll
-
Size
184KB
-
MD5
804cbc28202952a6125a693d8752604f
-
SHA1
13b0bd7c15eabf4165772fc839ad5853d578ba67
-
SHA256
b3c3ae90212c0ddb729694b4d6b6f7e51dee9b0a1b4c6cdd2d5c47f3a40aa20e
-
SHA512
2afc987cf6f257462c6e457e0f70c959a9f4b8ab5e6a1f286ba352395ea9476fc5ce132523407ca98f3370e71ef2bf33e099b9d6ab12b5a04416a1b64694d795
-
SSDEEP
3072:i92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTsrLA:i9NSMOEpQ1Q3ODAr+V4
Malware Config
Extracted
dridex
22203
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3076-1-0x00000000753F0000-0x000000007541F000-memory.dmp dridex_ldr behavioral2/memory/3076-2-0x00000000753F0000-0x000000007541F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1216 3076 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3076 4904 rundll32.exe 83 PID 4904 wrote to memory of 3076 4904 rundll32.exe 83 PID 4904 wrote to memory of 3076 4904 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3c3ae90212c0ddb729694b4d6b6f7e51dee9b0a1b4c6cdd2d5c47f3a40aa20e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3c3ae90212c0ddb729694b4d6b6f7e51dee9b0a1b4c6cdd2d5c47f3a40aa20e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 6203⤵
- Program crash
PID:1216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3076 -ip 30761⤵PID:4280