Analysis
-
max time kernel
75s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c8fb346842fa080727ba49adfc9caa40f81af58ac6c2bca340708fd0e519d66c.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_c8fb346842fa080727ba49adfc9caa40f81af58ac6c2bca340708fd0e519d66c.dll
-
Size
204KB
-
MD5
69cf2cd33f4cf46810b17da301650947
-
SHA1
7770640e97a3e6c5b0112d740ebb3f2b04a949f0
-
SHA256
c8fb346842fa080727ba49adfc9caa40f81af58ac6c2bca340708fd0e519d66c
-
SHA512
00b21e5e184919a965111b988807a70e246ffb4a4f8fe4f34e0433ffc871e4b5d9c8e02093b6791a953b8ccf45b9c25a8ce70b4b9c191f58a0a59d6bc35af59b
-
SSDEEP
3072:66FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:6ZuX6pEaeEDheWa+Jc9bhorfTw
Malware Config
Extracted
dridex
40111
45.58.56.12:443
162.241.54.59:6601
51.91.76.89:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3292-0-0x0000000074A80000-0x0000000074AB5000-memory.dmp dridex_ldr behavioral2/memory/3292-3-0x0000000074A80000-0x0000000074AB5000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 756 wrote to memory of 3292 756 rundll32.exe 82 PID 756 wrote to memory of 3292 756 rundll32.exe 82 PID 756 wrote to memory of 3292 756 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c8fb346842fa080727ba49adfc9caa40f81af58ac6c2bca340708fd0e519d66c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c8fb346842fa080727ba49adfc9caa40f81af58ac6c2bca340708fd0e519d66c.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3292
-