Analysis
-
max time kernel
77s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7841f9845431d73b1ae2d316efcb2cf285d712c04c93f2344851b9b74a222a51.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_7841f9845431d73b1ae2d316efcb2cf285d712c04c93f2344851b9b74a222a51.dll
-
Size
204KB
-
MD5
772cb124fb609ebcf09856e9eccd52d2
-
SHA1
4b7f0306481cef63fff12f219e9a44d993ba0aab
-
SHA256
7841f9845431d73b1ae2d316efcb2cf285d712c04c93f2344851b9b74a222a51
-
SHA512
7e7c7a828b90562491d9df6824dc55e280206f4398e43b87302a524625d43a4750891f65ba94987077afe36dc7f289c85ffbc56d5226aa6276b53f0f451b4665
-
SSDEEP
3072:n6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:nZuX6pEaeEDheWa+Jc9bhorfTw
Malware Config
Extracted
dridex
40111
45.58.56.12:443
162.241.54.59:6601
51.91.76.89:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/796-1-0x00000000751F0000-0x0000000075225000-memory.dmp dridex_ldr behavioral2/memory/796-4-0x00000000751F0000-0x0000000075225000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 920 wrote to memory of 796 920 rundll32.exe 83 PID 920 wrote to memory of 796 920 rundll32.exe 83 PID 920 wrote to memory of 796 920 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7841f9845431d73b1ae2d316efcb2cf285d712c04c93f2344851b9b74a222a51.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7841f9845431d73b1ae2d316efcb2cf285d712c04c93f2344851b9b74a222a51.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:796
-