Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_70a7b32c7e00571e0c80a11c86f71f07165286105a52495a1a8fc45016f3258e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_70a7b32c7e00571e0c80a11c86f71f07165286105a52495a1a8fc45016f3258e.dll
-
Size
184KB
-
MD5
6cacadeba3a765b9fc73d4d99a0838c0
-
SHA1
ab5d8eba226ab67e489fcff6e1ada6ee6dc4d66a
-
SHA256
70a7b32c7e00571e0c80a11c86f71f07165286105a52495a1a8fc45016f3258e
-
SHA512
48dc641884f47d08d78fde487a0b8426d129088dced7897ea5d86b94105049fb3a342bcc90310654d3aec1b853ca758ee69e66bd5973970a600b99f16752e35c
-
SSDEEP
3072:nuwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4KLlmsb:d7TXYsd9SkONU1jKGlslm
Malware Config
Extracted
dridex
22202
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4392-0-0x0000000074D80000-0x0000000074DB0000-memory.dmp dridex_ldr behavioral2/memory/4392-3-0x0000000074D80000-0x0000000074DB0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4052 4392 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1512 wrote to memory of 4392 1512 rundll32.exe 82 PID 1512 wrote to memory of 4392 1512 rundll32.exe 82 PID 1512 wrote to memory of 4392 1512 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70a7b32c7e00571e0c80a11c86f71f07165286105a52495a1a8fc45016f3258e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70a7b32c7e00571e0c80a11c86f71f07165286105a52495a1a8fc45016f3258e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 6163⤵
- Program crash
PID:4052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4392 -ip 43921⤵PID:4376