Analysis
-
max time kernel
110s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_28b9281f67ae9123155d65a5ea75265e020bd4df0c4c68a5b9b388e4fcd1b1ad.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_28b9281f67ae9123155d65a5ea75265e020bd4df0c4c68a5b9b388e4fcd1b1ad.dll
-
Size
204KB
-
MD5
31c1bd3cf202e8551a65df4bc90ea42b
-
SHA1
0e06ab5107503b06addedb193f7e76863e8d40f3
-
SHA256
28b9281f67ae9123155d65a5ea75265e020bd4df0c4c68a5b9b388e4fcd1b1ad
-
SHA512
f2abd55881be0e99d2365560f3740f71cd5b2c387afad366d628ab7a91ac3adcb6f185946a9f139bd411b15baa256108a00e4003d8fad2c23e66c5cd421207b6
-
SSDEEP
3072:O6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:OZuX6pEaeEDheWa+Jc9bhorfTw
Malware Config
Extracted
dridex
40111
45.58.56.12:443
162.241.54.59:6601
51.91.76.89:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/2100-1-0x00000000755C0000-0x00000000755F5000-memory.dmp dridex_ldr behavioral2/memory/2100-4-0x00000000755C0000-0x00000000755F5000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3240 wrote to memory of 2100 3240 rundll32.exe 82 PID 3240 wrote to memory of 2100 3240 rundll32.exe 82 PID 3240 wrote to memory of 2100 3240 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28b9281f67ae9123155d65a5ea75265e020bd4df0c4c68a5b9b388e4fcd1b1ad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28b9281f67ae9123155d65a5ea75265e020bd4df0c4c68a5b9b388e4fcd1b1ad.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2100
-