Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1b9cad248c33b154680bcb20bce319c805ea1bb7e880a690906d3c05d6acb08f.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_1b9cad248c33b154680bcb20bce319c805ea1bb7e880a690906d3c05d6acb08f.dll
-
Size
177KB
-
MD5
13b739a60d2238fedfcf685176f401f2
-
SHA1
e4e257a7770b920cd1eb83fcfe010674b9309473
-
SHA256
1b9cad248c33b154680bcb20bce319c805ea1bb7e880a690906d3c05d6acb08f
-
SHA512
1368f9a2dd7ac2f5a9ff7af716c0614565ac0d9ed4c03f51a13f67a9ff85be0b2c4d8ac532f05f4be857bf9a8a7da2acd95f8791e937f8f9b291143db312c5a7
-
SSDEEP
3072:juCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:HzWxkOP4p2EesvcDi6DOHPJ
Malware Config
Extracted
dridex
22201
144.76.1.150:443
50.249.212.98:23399
104.168.154.79:5007
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/352-1-0x0000000074F20000-0x0000000074F51000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 112 352 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1220 wrote to memory of 352 1220 rundll32.exe 30 PID 1220 wrote to memory of 352 1220 rundll32.exe 30 PID 1220 wrote to memory of 352 1220 rundll32.exe 30 PID 1220 wrote to memory of 352 1220 rundll32.exe 30 PID 1220 wrote to memory of 352 1220 rundll32.exe 30 PID 1220 wrote to memory of 352 1220 rundll32.exe 30 PID 1220 wrote to memory of 352 1220 rundll32.exe 30 PID 352 wrote to memory of 112 352 rundll32.exe 32 PID 352 wrote to memory of 112 352 rundll32.exe 32 PID 352 wrote to memory of 112 352 rundll32.exe 32 PID 352 wrote to memory of 112 352 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9cad248c33b154680bcb20bce319c805ea1bb7e880a690906d3c05d6acb08f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9cad248c33b154680bcb20bce319c805ea1bb7e880a690906d3c05d6acb08f.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 352 -s 2203⤵
- Program crash
PID:112
-
-