Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_76fa08f97fd40d9874cf739d3b771b634f27756f2fefaee0cce1f08fd508977b.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_76fa08f97fd40d9874cf739d3b771b634f27756f2fefaee0cce1f08fd508977b.dll
-
Size
188KB
-
MD5
b88c114e1c0a3e1f4e9b6f915bceca6f
-
SHA1
645483157e451605c186a67ed37b15e9aeccdcae
-
SHA256
76fa08f97fd40d9874cf739d3b771b634f27756f2fefaee0cce1f08fd508977b
-
SHA512
be95985d2f28eb5c5becfc4f9fd48913e9d2cee3d2071582f16de75b41c5573c6af30ae8f1fa897f55bba278b7c11107b3080f754d41055b5573474dad97fbae
-
SSDEEP
3072:3A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoto:3zIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
dridex
22201
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/2988-1-0x0000000074D50000-0x0000000074D80000-memory.dmp dridex_ldr behavioral2/memory/2988-2-0x0000000074D50000-0x0000000074D80000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3432 2988 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2988 4052 rundll32.exe 83 PID 4052 wrote to memory of 2988 4052 rundll32.exe 83 PID 4052 wrote to memory of 2988 4052 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76fa08f97fd40d9874cf739d3b771b634f27756f2fefaee0cce1f08fd508977b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76fa08f97fd40d9874cf739d3b771b634f27756f2fefaee0cce1f08fd508977b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 6883⤵
- Program crash
PID:3432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2988 -ip 29881⤵PID:2868