Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c20a288550994710ac86bf586cbc4dcbb44d9cf8da1c2ce0d4d452d2d713fd22.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_c20a288550994710ac86bf586cbc4dcbb44d9cf8da1c2ce0d4d452d2d713fd22.dll
-
Size
184KB
-
MD5
562c20d1e6f1551b3453910cadda8a52
-
SHA1
3c2333d3955d045c24837fbf98da7be2e31de43e
-
SHA256
c20a288550994710ac86bf586cbc4dcbb44d9cf8da1c2ce0d4d452d2d713fd22
-
SHA512
74eae1a284e063ff9bffee0cad79aa67f7ed7b49509f3eb1c45793d2667ee70761e3d940a51c53d5a3600f50ee08ab420755c744b7b3258858d99957a824f074
-
SSDEEP
3072:Y92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTYrLA:Y9NSMOEpQ1Q3ODAr+V8
Malware Config
Extracted
dridex
22203
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3824-0-0x0000000074DF0000-0x0000000074E1F000-memory.dmp dridex_ldr behavioral2/memory/3824-3-0x0000000074DF0000-0x0000000074E1F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4436 3824 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3824 4832 rundll32.exe 82 PID 4832 wrote to memory of 3824 4832 rundll32.exe 82 PID 4832 wrote to memory of 3824 4832 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c20a288550994710ac86bf586cbc4dcbb44d9cf8da1c2ce0d4d452d2d713fd22.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c20a288550994710ac86bf586cbc4dcbb44d9cf8da1c2ce0d4d452d2d713fd22.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 6243⤵
- Program crash
PID:4436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3824 -ip 38241⤵PID:2068