Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bd8155c7264b7204607ac65778237f2541df075679b32c9833dfbe7af0826258.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_bd8155c7264b7204607ac65778237f2541df075679b32c9833dfbe7af0826258.dll
-
Size
160KB
-
MD5
af967109cf55e70dd68147f4a917d3f0
-
SHA1
c0741a04a19d30b9222d95c7528cf4129ca0249c
-
SHA256
bd8155c7264b7204607ac65778237f2541df075679b32c9833dfbe7af0826258
-
SHA512
45e9f9aa99bdf5256ec4f684ab2f9fb86d0b86f03f64fb03c2151a9d3608ae8d3aa614a0761422512ae5ec69fe52e1dd68fda6552a477a932fb3bb0b601a27a8
-
SSDEEP
3072:whOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:n8mnT7Fmsans1+0Hw7/t
Malware Config
Extracted
dridex
40111
185.148.168.240:443
162.216.125.131:2303
193.200.130.178:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4844-1-0x0000000075310000-0x000000007533E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 536 4844 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4844 4056 rundll32.exe 83 PID 4056 wrote to memory of 4844 4056 rundll32.exe 83 PID 4056 wrote to memory of 4844 4056 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bd8155c7264b7204607ac65778237f2541df075679b32c9833dfbe7af0826258.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bd8155c7264b7204607ac65778237f2541df075679b32c9833dfbe7af0826258.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 7123⤵
- Program crash
PID:536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4844 -ip 48441⤵PID:4940