Analysis
-
max time kernel
96s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f4e91332ade055ae83d26ff20ee0ab06ba73b803fa54bf6a212cd5478c6a5fa3.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f4e91332ade055ae83d26ff20ee0ab06ba73b803fa54bf6a212cd5478c6a5fa3.dll
-
Size
188KB
-
MD5
d64d2f68021eaf32bb09bd3aba35437d
-
SHA1
cce2a94c3317e9a757d31fece28c591dddc2aa3e
-
SHA256
f4e91332ade055ae83d26ff20ee0ab06ba73b803fa54bf6a212cd5478c6a5fa3
-
SHA512
ecbc5b09c65970930e3ed3597243c2132099a96e13388d74e1299363a01471d800194730710613c44b7ea84635f79f1c6ca81e960eb69dd70193bd28b299885e
-
SSDEEP
3072:5teMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzX9qM:Vq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/2044-0-0x0000000075590000-0x00000000755C0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 516 2044 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 860 wrote to memory of 2044 860 rundll32.exe 83 PID 860 wrote to memory of 2044 860 rundll32.exe 83 PID 860 wrote to memory of 2044 860 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4e91332ade055ae83d26ff20ee0ab06ba73b803fa54bf6a212cd5478c6a5fa3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4e91332ade055ae83d26ff20ee0ab06ba73b803fa54bf6a212cd5478c6a5fa3.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 6923⤵
- Program crash
PID:516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2044 -ip 20441⤵PID:2580