Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f4a1fb5d39ffa6d40953de29c08cad1fdc04da3c47c5e0e428940fbed40f1ca3.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f4a1fb5d39ffa6d40953de29c08cad1fdc04da3c47c5e0e428940fbed40f1ca3.dll
-
Size
184KB
-
MD5
6a0596b330978851d1bc28601863119f
-
SHA1
445ac4facc3b2ebfcf316a0111361a1708c340ff
-
SHA256
f4a1fb5d39ffa6d40953de29c08cad1fdc04da3c47c5e0e428940fbed40f1ca3
-
SHA512
c771af8eb515c1568baf9b44cfe1df506737c30c6d9f83d137fe88e17d43295fa1dca3e679c98fb7443078b545d226ac256af75fe70d6e6cd47edde383ce1856
-
SSDEEP
3072:TiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoFlzoxss7:TiLVCIT4WK2z1W+CUHZj4Skq/eaoLoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4412-1-0x0000000075880000-0x00000000758AF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2228 4412 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4412 2420 rundll32.exe 83 PID 2420 wrote to memory of 4412 2420 rundll32.exe 83 PID 2420 wrote to memory of 4412 2420 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4a1fb5d39ffa6d40953de29c08cad1fdc04da3c47c5e0e428940fbed40f1ca3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4a1fb5d39ffa6d40953de29c08cad1fdc04da3c47c5e0e428940fbed40f1ca3.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 6163⤵
- Program crash
PID:2228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4412 -ip 44121⤵PID:2776