Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0409e76f5588b7c527df674722781f89c70232b53b95546c98ff76fc37676d5c.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_0409e76f5588b7c527df674722781f89c70232b53b95546c98ff76fc37676d5c.dll
-
Size
160KB
-
MD5
949a2984d3b8919091396c76b38588d9
-
SHA1
194a81d325a8a6d7b6abdaa9231717a857afa861
-
SHA256
0409e76f5588b7c527df674722781f89c70232b53b95546c98ff76fc37676d5c
-
SHA512
ba6f2ab97bdbf7dd279926be514eb4fb4a064d959ac116b5fa94f9ae847f58c1be3b41bf2cc34f6756eca8c7fcf56dc5c0b1aca0a2eefb23cf5f455cdfdac56d
-
SSDEEP
3072:zF5RgjZh7gpk57/MbVelsxoNTen1v/HuxbIXU89J3WgMh8DH6:Z52j4pk5zMbVO6/HUIXU8KgMyD
Malware Config
Extracted
dridex
40111
188.226.199.7:443
46.101.216.218:8172
178.254.33.197:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2652-0-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2652 1268 rundll32.exe 31 PID 1268 wrote to memory of 2652 1268 rundll32.exe 31 PID 1268 wrote to memory of 2652 1268 rundll32.exe 31 PID 1268 wrote to memory of 2652 1268 rundll32.exe 31 PID 1268 wrote to memory of 2652 1268 rundll32.exe 31 PID 1268 wrote to memory of 2652 1268 rundll32.exe 31 PID 1268 wrote to memory of 2652 1268 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0409e76f5588b7c527df674722781f89c70232b53b95546c98ff76fc37676d5c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0409e76f5588b7c527df674722781f89c70232b53b95546c98ff76fc37676d5c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2652
-