Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fdcb6cb210348b8ff877b1bd5fc8741da6be4e262c1029772940f36020f88bce.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_fdcb6cb210348b8ff877b1bd5fc8741da6be4e262c1029772940f36020f88bce.dll
-
Size
160KB
-
MD5
646988ecf27b8d77203cf2300cc31a45
-
SHA1
edc6d40854e9f56d714917d6fda09851be2bcda6
-
SHA256
fdcb6cb210348b8ff877b1bd5fc8741da6be4e262c1029772940f36020f88bce
-
SHA512
7674b22c1c865950632f2b06c746f73d18d02c55d42700a1bfe98a54a335a35a0869cd5a41bd72ff1f17558d0da3818ca08d63cda1205c84839fc8f662d00569
-
SSDEEP
3072:Hs5RgjZh7gpk57/MbVelsxoNTen1v/HuxbIXU89J3WgMh8kH6:M52j4pk5zMbVO6/HUIXU8KgMyk
Malware Config
Extracted
dridex
40111
188.226.199.7:443
46.101.216.218:8172
178.254.33.197:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2016-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2016 1648 rundll32.exe 31 PID 1648 wrote to memory of 2016 1648 rundll32.exe 31 PID 1648 wrote to memory of 2016 1648 rundll32.exe 31 PID 1648 wrote to memory of 2016 1648 rundll32.exe 31 PID 1648 wrote to memory of 2016 1648 rundll32.exe 31 PID 1648 wrote to memory of 2016 1648 rundll32.exe 31 PID 1648 wrote to memory of 2016 1648 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fdcb6cb210348b8ff877b1bd5fc8741da6be4e262c1029772940f36020f88bce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fdcb6cb210348b8ff877b1bd5fc8741da6be4e262c1029772940f36020f88bce.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2016
-