Analysis
-
max time kernel
98s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a4b3982234a0569221b9386a7611ef4a5d930b028855e7eee3a20b3461f07838.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a4b3982234a0569221b9386a7611ef4a5d930b028855e7eee3a20b3461f07838.dll
-
Size
184KB
-
MD5
94b9521101a121faacd35caaef0a7fc4
-
SHA1
3c345aaf6ab89e560aa32d4048a2f095a18a9b7e
-
SHA256
a4b3982234a0569221b9386a7611ef4a5d930b028855e7eee3a20b3461f07838
-
SHA512
ce3bd1d823abf0674666c8c35eb0abfa210e71dbf235e8c9fb5e3b4ad2411dc6048e4862769e000e75c82b68e16b2e7f199040f1f6d2e8f232540d77e20698ae
-
SSDEEP
3072:N92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTGrLA:N9NSMOEpQ1Q3ODAr+Vi
Malware Config
Extracted
dridex
22203
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4436-0-0x0000000074C90000-0x0000000074CBF000-memory.dmp dridex_ldr behavioral2/memory/4436-3-0x0000000074C90000-0x0000000074CBF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3296 4436 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4436 5008 rundll32.exe 83 PID 5008 wrote to memory of 4436 5008 rundll32.exe 83 PID 5008 wrote to memory of 4436 5008 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a4b3982234a0569221b9386a7611ef4a5d930b028855e7eee3a20b3461f07838.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a4b3982234a0569221b9386a7611ef4a5d930b028855e7eee3a20b3461f07838.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 6243⤵
- Program crash
PID:3296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4436 -ip 44361⤵PID:5048