Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2fb4bb043edd1087c877e7392007bd3f97452de10077232c26c08c42628519c2.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2fb4bb043edd1087c877e7392007bd3f97452de10077232c26c08c42628519c2.dll
-
Size
188KB
-
MD5
4d6021bb150e9da79d55bb1f13988e17
-
SHA1
40459f07f0d7d689d920696a47b16cfa459cc3e8
-
SHA256
2fb4bb043edd1087c877e7392007bd3f97452de10077232c26c08c42628519c2
-
SHA512
79ffc271a67bf43b532df9a7334baa9b5bf3c9614d9ffaad48015bf13c31d64941bb466a0f469dcc5b447bbea3890bed30a0b7a5de67db0c0483cddd99d8cc48
-
SSDEEP
3072:uteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzq9qM:Gq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2540-0-0x00000000749F0000-0x0000000074A20000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2920 2540 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2540 3048 rundll32.exe 30 PID 3048 wrote to memory of 2540 3048 rundll32.exe 30 PID 3048 wrote to memory of 2540 3048 rundll32.exe 30 PID 3048 wrote to memory of 2540 3048 rundll32.exe 30 PID 3048 wrote to memory of 2540 3048 rundll32.exe 30 PID 3048 wrote to memory of 2540 3048 rundll32.exe 30 PID 3048 wrote to memory of 2540 3048 rundll32.exe 30 PID 2540 wrote to memory of 2920 2540 rundll32.exe 32 PID 2540 wrote to memory of 2920 2540 rundll32.exe 32 PID 2540 wrote to memory of 2920 2540 rundll32.exe 32 PID 2540 wrote to memory of 2920 2540 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2fb4bb043edd1087c877e7392007bd3f97452de10077232c26c08c42628519c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2fb4bb043edd1087c877e7392007bd3f97452de10077232c26c08c42628519c2.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 3003⤵
- Program crash
PID:2920
-
-