Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1.dll
-
Size
188KB
-
MD5
e1184d911eb5e7d04673a2c2808076ad
-
SHA1
f7a0792a5a612e4d984f6d362027396635593688
-
SHA256
32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1
-
SHA512
6b6d53b72e832465e0354974ce4e7f80f78e50adbf7be2b3061806b53773ec85ec33ac28f396345b3efb5dfffca1321941ea1deabc8fc82d7e0127dc1ea7217e
-
SSDEEP
3072:pA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAomo:pzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1268-1-0x0000000075380000-0x00000000753B0000-memory.dmp dridex_ldr behavioral1/memory/1268-2-0x0000000075380000-0x00000000753B0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2100 1268 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1268 2372 rundll32.exe 30 PID 2372 wrote to memory of 1268 2372 rundll32.exe 30 PID 2372 wrote to memory of 1268 2372 rundll32.exe 30 PID 2372 wrote to memory of 1268 2372 rundll32.exe 30 PID 2372 wrote to memory of 1268 2372 rundll32.exe 30 PID 2372 wrote to memory of 1268 2372 rundll32.exe 30 PID 2372 wrote to memory of 1268 2372 rundll32.exe 30 PID 1268 wrote to memory of 2100 1268 rundll32.exe 32 PID 1268 wrote to memory of 2100 1268 rundll32.exe 32 PID 1268 wrote to memory of 2100 1268 rundll32.exe 32 PID 1268 wrote to memory of 2100 1268 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_32da0a3e2196ac5e4d439d7e4fbc7d854a34f6fcd284919822aeaa9b3f412ff1.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 3003⤵
- Program crash
PID:2100
-
-