Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4c66a0997bc0f775717bbc354316b6d6b8c9d17bdbefb34f56ae599f778d79bf.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4c66a0997bc0f775717bbc354316b6d6b8c9d17bdbefb34f56ae599f778d79bf.dll
-
Size
166KB
-
MD5
daf937c57f66da4fdf15667f8994925a
-
SHA1
5c642db530f416375aec5d7880b7ee0a91964322
-
SHA256
4c66a0997bc0f775717bbc354316b6d6b8c9d17bdbefb34f56ae599f778d79bf
-
SHA512
60a952129d59f68f8ee8a4c62d6737edba92b23a5b19cc66cac2c5ec473e99e9c7ed72096ebc1e64e7b253e025257a146c40751f05f160f458cc6d17483f547c
-
SSDEEP
3072:ZBoQctVOM7/8wZQvUlM7EF+V2xReSbHNjztUJQ8eHAh:HuXLcclWEc2HeSjNjGdegh
Malware Config
Extracted
dridex
22203
131.100.24.202:443
193.160.214.95:4125
67.43.4.76:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/5052-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr behavioral2/memory/5052-2-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3116 5052 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 5052 1896 rundll32.exe 83 PID 1896 wrote to memory of 5052 1896 rundll32.exe 83 PID 1896 wrote to memory of 5052 1896 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4c66a0997bc0f775717bbc354316b6d6b8c9d17bdbefb34f56ae599f778d79bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4c66a0997bc0f775717bbc354316b6d6b8c9d17bdbefb34f56ae599f778d79bf.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 7123⤵
- Program crash
PID:3116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5052 -ip 50521⤵PID:628