Analysis

  • max time kernel
    98s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2024, 17:17

General

  • Target

    JaffaCakes118_c33f0b640a7e3915178db4bf37c2e650bf46ecfad53e94dda1e2bc021fbeea7c.dll

  • Size

    204KB

  • MD5

    10feb7e27b73ceb19f32f5ebdd4c685b

  • SHA1

    2378bdcba2db8e886d593c429a7eddf0a640b9aa

  • SHA256

    c33f0b640a7e3915178db4bf37c2e650bf46ecfad53e94dda1e2bc021fbeea7c

  • SHA512

    14b38691d5758fbf01969d7f54573428df77e2c12b3de65a61b037f2e591ee43119db3b44fc83c97d7e5e035aaeef38ad2454a0943dfd5d3eeaee33ae83a2689

  • SSDEEP

    3072:k6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:kZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Loader 2 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c33f0b640a7e3915178db4bf37c2e650bf46ecfad53e94dda1e2bc021fbeea7c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c33f0b640a7e3915178db4bf37c2e650bf46ecfad53e94dda1e2bc021fbeea7c.dll,#1
      2⤵
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2308-0-0x0000000002860000-0x0000000002866000-memory.dmp

    Filesize

    24KB

  • memory/2308-1-0x0000000074930000-0x0000000074965000-memory.dmp

    Filesize

    212KB

  • memory/2308-3-0x0000000002860000-0x0000000002866000-memory.dmp

    Filesize

    24KB

  • memory/2308-4-0x0000000074930000-0x0000000074965000-memory.dmp

    Filesize

    212KB