Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_12eccb6a258638a2a06d553ecd49b9a900dbf3f7bfafbe836c35f71bceb6273d.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_12eccb6a258638a2a06d553ecd49b9a900dbf3f7bfafbe836c35f71bceb6273d.dll
-
Size
160KB
-
MD5
ec807a0dbeed14df4b79fec4f0e4cab4
-
SHA1
81d70fc430002cddfc27ad0eb9f19f52e6e9dc64
-
SHA256
12eccb6a258638a2a06d553ecd49b9a900dbf3f7bfafbe836c35f71bceb6273d
-
SHA512
9a66e0791b140f8fede2fd95f3fa0d88fd6797309271bab3425fc953147efae115a4afae9e8b649524ff73b9c7af2360bf1e1747455885ecdd789cfe857a0164
-
SSDEEP
3072:ROOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:x8mnT7Fmsans1+0Hw7/t
Malware Config
Extracted
dridex
40111
185.148.168.240:443
162.216.125.131:2303
193.200.130.178:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1668-1-0x0000000074660000-0x000000007468E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2284 1668 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 584 wrote to memory of 1668 584 rundll32.exe 31 PID 584 wrote to memory of 1668 584 rundll32.exe 31 PID 584 wrote to memory of 1668 584 rundll32.exe 31 PID 584 wrote to memory of 1668 584 rundll32.exe 31 PID 584 wrote to memory of 1668 584 rundll32.exe 31 PID 584 wrote to memory of 1668 584 rundll32.exe 31 PID 584 wrote to memory of 1668 584 rundll32.exe 31 PID 1668 wrote to memory of 2284 1668 rundll32.exe 32 PID 1668 wrote to memory of 2284 1668 rundll32.exe 32 PID 1668 wrote to memory of 2284 1668 rundll32.exe 32 PID 1668 wrote to memory of 2284 1668 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12eccb6a258638a2a06d553ecd49b9a900dbf3f7bfafbe836c35f71bceb6273d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12eccb6a258638a2a06d553ecd49b9a900dbf3f7bfafbe836c35f71bceb6273d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 2563⤵
- Program crash
PID:2284
-
-