Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a24862a7ba7806e9d18e5cb4ad77c86b217eef497519cfffbb8e3abfc8ff013e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a24862a7ba7806e9d18e5cb4ad77c86b217eef497519cfffbb8e3abfc8ff013e.dll
-
Size
167KB
-
MD5
8ec129d1ab933d7c9c1e274053a41545
-
SHA1
e145964d839d6f2137c498b265ae9bb0b986b3e4
-
SHA256
a24862a7ba7806e9d18e5cb4ad77c86b217eef497519cfffbb8e3abfc8ff013e
-
SHA512
505dff2b2fbf42c7ed9ab84ef044d89a1ec9a688064121032ce3664edc143ab4c9cabd846471c9da4e99f61351219122f881529e7862b54bb8bd3993c106e42b
-
SSDEEP
3072:HLG/TPp+AgPbdXnx6ZBfPG6+Xo4Y63F35oJq3Kco08AQazELZn+1qPrx6/idvJ:KERMVPG6+Y63HoG1QawL40Prx6KJJ
Malware Config
Extracted
dridex
22201
131.100.24.202:443
193.160.214.95:4125
67.43.4.76:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/2348-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr behavioral2/memory/2348-2-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2996 2348 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2348 1860 rundll32.exe 82 PID 1860 wrote to memory of 2348 1860 rundll32.exe 82 PID 1860 wrote to memory of 2348 1860 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a24862a7ba7806e9d18e5cb4ad77c86b217eef497519cfffbb8e3abfc8ff013e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a24862a7ba7806e9d18e5cb4ad77c86b217eef497519cfffbb8e3abfc8ff013e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 7123⤵
- Program crash
PID:2996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2348 -ip 23481⤵PID:3656