Analysis
-
max time kernel
42s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b2b5bb94f9751d84171f7524ca21254a660725ab10a487f2d5dce1eb17a1d2b9.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b2b5bb94f9751d84171f7524ca21254a660725ab10a487f2d5dce1eb17a1d2b9.dll
-
Size
160KB
-
MD5
f242b6cdfde8863a15a05b54652aa06c
-
SHA1
c61968d6525623d41eae67c44d97056196929b6d
-
SHA256
b2b5bb94f9751d84171f7524ca21254a660725ab10a487f2d5dce1eb17a1d2b9
-
SHA512
09db53a14d712d41629ca85e421539eec8b9cf38e85b4e40136a1323d2ef9656bbeb711b86dced6f8a6374946765d4acf1e18763896600e8a57ef5ec11dba9c9
-
SSDEEP
3072:QWX2IjzzpM+PncPeY8+O3AU3HRIHPh3UGfXy0BHNkIv/ScbQQ2y0iNM0+y+N0tc:Q42IfzNPnoeY8j3AsHGPXpHNj6rByM3
Malware Config
Extracted
dridex
40111
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/1352-1-0x0000000075880000-0x00000000758AE000-memory.dmp dridex_ldr behavioral2/memory/1352-4-0x0000000075880000-0x00000000758AE000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1352 4900 rundll32.exe 83 PID 4900 wrote to memory of 1352 4900 rundll32.exe 83 PID 4900 wrote to memory of 1352 4900 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2b5bb94f9751d84171f7524ca21254a660725ab10a487f2d5dce1eb17a1d2b9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2b5bb94f9751d84171f7524ca21254a660725ab10a487f2d5dce1eb17a1d2b9.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:1352
-