Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3.dll
-
Size
608KB
-
MD5
5594530e878fdfe0738cc51ea044d7f5
-
SHA1
991d77337090fffc904bd0f3d77cf8749a0a70a2
-
SHA256
8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3
-
SHA512
de7c30148898c9ed9bd9aaf3e91e4f75dc06b53708dd1177969b1b7c945d0910ccbd66da8095f62bfeb9ced36541fef18ef54dfb90baa5342935c47df4e68884
-
SSDEEP
12288:qZGQdqOG9RJqydLqQSeCqsVK8kPRGO35N9mVpzXc6:qZ0HWjeCVVK8kP9N9ol
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 13 1076 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 1076 412 rundll32.exe 83 PID 412 wrote to memory of 1076 412 rundll32.exe 83 PID 412 wrote to memory of 1076 412 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:1076
-