Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_99973d940e73c89808bcc31fed13124fc5ddc9c29233bdf6e3f061c4a0040c2a.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_99973d940e73c89808bcc31fed13124fc5ddc9c29233bdf6e3f061c4a0040c2a.dll
-
Size
171KB
-
MD5
ce5df597659a7676c9d58e7fa18584f8
-
SHA1
78c384bd0d31f3bb268f216aeb3aa4e6bac24bfb
-
SHA256
99973d940e73c89808bcc31fed13124fc5ddc9c29233bdf6e3f061c4a0040c2a
-
SHA512
77448762906235582c41541b4ea1a4ea5fb3e3b586a59272f11fc44a41c257287d7b17b54966a17e3cdb2ab350e03b7edc878f73469335f7f444a0ecdf1e6a5c
-
SSDEEP
3072:Mi49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:MH9RVaPEmsdHdbQUbd2H3
Malware Config
Extracted
dridex
22201
128.199.200.38:443
192.163.233.216:6601
43.229.206.244:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3292-0-0x00000000757C0000-0x00000000757F0000-memory.dmp dridex_ldr behavioral2/memory/3292-3-0x00000000757C0000-0x00000000757F0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 220 3292 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3412 wrote to memory of 3292 3412 rundll32.exe 82 PID 3412 wrote to memory of 3292 3412 rundll32.exe 82 PID 3412 wrote to memory of 3292 3412 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99973d940e73c89808bcc31fed13124fc5ddc9c29233bdf6e3f061c4a0040c2a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99973d940e73c89808bcc31fed13124fc5ddc9c29233bdf6e3f061c4a0040c2a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 6723⤵
- Program crash
PID:220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3292 -ip 32921⤵PID:4220