Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8634b1405632cd7e852d66e79d7a3d47bf53d78391f688c641decf72eefe77d4.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8634b1405632cd7e852d66e79d7a3d47bf53d78391f688c641decf72eefe77d4.dll
-
Size
188KB
-
MD5
f029e7a8431d61b9f56e743b27813d16
-
SHA1
b90192bd09700f970a414ff1b42cbaa654badfc0
-
SHA256
8634b1405632cd7e852d66e79d7a3d47bf53d78391f688c641decf72eefe77d4
-
SHA512
8a4808749d776875c589c67534d2d96fcc54fe41075e6c52022be315b980bfadef4f97feeaecf2cede276eefaa63d8db4b7a00702305b8844c67b5607e092c89
-
SSDEEP
3072:lteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:hq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/3020-1-0x0000000075050000-0x0000000075080000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2420 3020 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 3020 wrote to memory of 2420 3020 rundll32.exe 32 PID 3020 wrote to memory of 2420 3020 rundll32.exe 32 PID 3020 wrote to memory of 2420 3020 rundll32.exe 32 PID 3020 wrote to memory of 2420 3020 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8634b1405632cd7e852d66e79d7a3d47bf53d78391f688c641decf72eefe77d4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8634b1405632cd7e852d66e79d7a3d47bf53d78391f688c641decf72eefe77d4.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 3003⤵
- Program crash
PID:2420
-
-