Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bd8153edf22051318968685ae250d23199cf7218fe1d459f0f1e79a7c07c98aa.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_bd8153edf22051318968685ae250d23199cf7218fe1d459f0f1e79a7c07c98aa.dll
-
Size
161KB
-
MD5
3a00e02aa991a0b1c7bd85eb95e5ff43
-
SHA1
262a1beed3b378f59ff00735a81243621060d29a
-
SHA256
bd8153edf22051318968685ae250d23199cf7218fe1d459f0f1e79a7c07c98aa
-
SHA512
ac4b02829d2aec06794ec74aa6a2b988c6519d732f5f7e77bf40bdbd4ba7f32a3fac396aa87535c861643e63a1f8704324fcb31d313cb306ba7da0c1cffbb272
-
SSDEEP
3072:wM2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/gp8AF:+G3rUvoU4JE/Wzan9T7B/CKsL/gy
Malware Config
Extracted
dridex
40112
193.200.130.181:443
95.138.161.226:2303
167.114.113.13:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2248-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2248 2492 rundll32.exe 30 PID 2492 wrote to memory of 2248 2492 rundll32.exe 30 PID 2492 wrote to memory of 2248 2492 rundll32.exe 30 PID 2492 wrote to memory of 2248 2492 rundll32.exe 30 PID 2492 wrote to memory of 2248 2492 rundll32.exe 30 PID 2492 wrote to memory of 2248 2492 rundll32.exe 30 PID 2492 wrote to memory of 2248 2492 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bd8153edf22051318968685ae250d23199cf7218fe1d459f0f1e79a7c07c98aa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bd8153edf22051318968685ae250d23199cf7218fe1d459f0f1e79a7c07c98aa.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2248
-