Analysis
-
max time kernel
93s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0f60bb1e0d64c686783f93107e6a7665b5bf49e4590c2777b0bd0da76e8b0f42.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0f60bb1e0d64c686783f93107e6a7665b5bf49e4590c2777b0bd0da76e8b0f42.dll
-
Size
171KB
-
MD5
59dfab1131f69f6415fd595ddb9d6cc0
-
SHA1
393bf3fe48afe2e0cbe6068da5676a457cc8a7a1
-
SHA256
0f60bb1e0d64c686783f93107e6a7665b5bf49e4590c2777b0bd0da76e8b0f42
-
SHA512
6d9b2a83060af06ef338ef57f9355c9422e2b40cbaae0285a7de9fb19c6ab4da9d30129dd54462537c4d27f4479daa3eb70e075d390d4d1e7822e66967b5137a
-
SSDEEP
3072:Si49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:SH9RVaPEmsdHdbQUbd2H3
Malware Config
Extracted
dridex
22201
128.199.200.38:443
192.163.233.216:6601
43.229.206.244:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/2828-1-0x0000000074D10000-0x0000000074D40000-memory.dmp dridex_ldr behavioral2/memory/2828-2-0x0000000074D10000-0x0000000074D40000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4196 2828 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4508 wrote to memory of 2828 4508 rundll32.exe 82 PID 4508 wrote to memory of 2828 4508 rundll32.exe 82 PID 4508 wrote to memory of 2828 4508 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f60bb1e0d64c686783f93107e6a7665b5bf49e4590c2777b0bd0da76e8b0f42.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f60bb1e0d64c686783f93107e6a7665b5bf49e4590c2777b0bd0da76e8b0f42.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 6723⤵
- Program crash
PID:4196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2828 -ip 28281⤵PID:464