Analysis
-
max time kernel
112s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9a733994c325d2624b6750e563dcb55df0b0224dcd53cf9a6cac5ddd3426d937.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_9a733994c325d2624b6750e563dcb55df0b0224dcd53cf9a6cac5ddd3426d937.dll
-
Size
204KB
-
MD5
7ea529bf9ce91a155f9cc37852d774bc
-
SHA1
d122e012c1060ff720bab62c7f134e22bc32bb1e
-
SHA256
9a733994c325d2624b6750e563dcb55df0b0224dcd53cf9a6cac5ddd3426d937
-
SHA512
b74186b990ddb96fd5b9dc0bd0e28dfc755bf4bc7a559c65ea2c69e56d74fe8df32c76ac757a139fc4316a35e173ce7da0865b5c34f877c31123e818955c0f26
-
SSDEEP
3072:r6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:rZuX6pEaeEDheWa+Jc9bhorfTw
Malware Config
Extracted
dridex
40111
45.58.56.12:443
162.241.54.59:6601
51.91.76.89:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/436-1-0x00000000758E0000-0x0000000075915000-memory.dmp dridex_ldr behavioral2/memory/436-2-0x00000000758E0000-0x0000000075915000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4988 wrote to memory of 436 4988 rundll32.exe 82 PID 4988 wrote to memory of 436 4988 rundll32.exe 82 PID 4988 wrote to memory of 436 4988 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a733994c325d2624b6750e563dcb55df0b0224dcd53cf9a6cac5ddd3426d937.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a733994c325d2624b6750e563dcb55df0b0224dcd53cf9a6cac5ddd3426d937.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:436
-