Analysis
-
max time kernel
111s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3b5bf6547861fea22196ec794d33c264e764f92b06f2fc9a1d8594752920c980.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3b5bf6547861fea22196ec794d33c264e764f92b06f2fc9a1d8594752920c980.dll
-
Size
204KB
-
MD5
a916d5e60b50db8b60810fd546e513f9
-
SHA1
210846f72d7bfb98caaf857173c585c0fb7c766b
-
SHA256
3b5bf6547861fea22196ec794d33c264e764f92b06f2fc9a1d8594752920c980
-
SHA512
94302a3cc4a7c809e06bcb4c5dae3118486c7140c8ec74230399024fdba0de4b329f3fcd7e87f1854fc8ff66c92197b656e6e3a8af91eb5824a84173458cbdcb
-
SSDEEP
3072:A6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:AZuX6pEaeEDheWa+Jc9bhorfTw
Malware Config
Extracted
dridex
40111
45.58.56.12:443
162.241.54.59:6601
51.91.76.89:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4196-1-0x0000000075200000-0x0000000075235000-memory.dmp dridex_ldr behavioral2/memory/4196-4-0x0000000075200000-0x0000000075235000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4196 1528 rundll32.exe 82 PID 1528 wrote to memory of 4196 1528 rundll32.exe 82 PID 1528 wrote to memory of 4196 1528 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b5bf6547861fea22196ec794d33c264e764f92b06f2fc9a1d8594752920c980.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b5bf6547861fea22196ec794d33c264e764f92b06f2fc9a1d8594752920c980.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:4196
-