Analysis
-
max time kernel
60s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4e72556e7d93b791b157720d47743230085321d7eaf636a07d4664a5ecc70bf0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4e72556e7d93b791b157720d47743230085321d7eaf636a07d4664a5ecc70bf0.dll
-
Size
204KB
-
MD5
264a4eef23e05f3d7273ac87d7a8c369
-
SHA1
4fd4dc7788185985cafa109ed97bcc717ef78802
-
SHA256
4e72556e7d93b791b157720d47743230085321d7eaf636a07d4664a5ecc70bf0
-
SHA512
1a4a067b1a0bc8576db89845617b85b8b1dfea0862ce862ec6658480f75035a4de5467bc33f6ccda6b4e81331247834fbd6874fc090a6385d6b1d47c2bf1ee3c
-
SSDEEP
3072:O6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:OZuX6pEaeEDheWa+Jc9bhorfTw
Malware Config
Extracted
dridex
40111
45.58.56.12:443
162.241.54.59:6601
51.91.76.89:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/2704-1-0x0000000074FE0000-0x0000000075015000-memory.dmp dridex_ldr behavioral2/memory/2704-4-0x0000000074FE0000-0x0000000075015000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2704 1664 rundll32.exe 83 PID 1664 wrote to memory of 2704 1664 rundll32.exe 83 PID 1664 wrote to memory of 2704 1664 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e72556e7d93b791b157720d47743230085321d7eaf636a07d4664a5ecc70bf0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e72556e7d93b791b157720d47743230085321d7eaf636a07d4664a5ecc70bf0.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2704
-