Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_034c5b3748dc08d59b4f19026fa8a21f6115935718977eaed95649d992517e42.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_034c5b3748dc08d59b4f19026fa8a21f6115935718977eaed95649d992517e42.dll
-
Size
188KB
-
MD5
d167163eeed4776a1cdd0509d898a2a8
-
SHA1
193df3f3d7040c716f89c728f78e9f476c0c90c7
-
SHA256
034c5b3748dc08d59b4f19026fa8a21f6115935718977eaed95649d992517e42
-
SHA512
e9155d78f70a80db474c80383cee25ae1be875ebba51db4f0ed4f06f1421daba113cb22f31e04efbde6db11b72525649e7d65b8e780d7e8d1453698fe63a34b9
-
SSDEEP
3072:TA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoio:TzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3928-1-0x0000000074F10000-0x0000000074F40000-memory.dmp dridex_ldr behavioral2/memory/3928-2-0x0000000074F10000-0x0000000074F40000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4900 3928 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3304 wrote to memory of 3928 3304 rundll32.exe 83 PID 3304 wrote to memory of 3928 3304 rundll32.exe 83 PID 3304 wrote to memory of 3928 3304 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_034c5b3748dc08d59b4f19026fa8a21f6115935718977eaed95649d992517e42.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_034c5b3748dc08d59b4f19026fa8a21f6115935718977eaed95649d992517e42.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 6883⤵
- Program crash
PID:4900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3928 -ip 39281⤵PID:2452