Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 18:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f35f3521db0090fbc27d9efbbcb14775ea902e45a9d9fa038488b4d11e175c08.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f35f3521db0090fbc27d9efbbcb14775ea902e45a9d9fa038488b4d11e175c08.dll
-
Size
160KB
-
MD5
927ec3dfef11e49978fadc4c6b3c32cc
-
SHA1
090f47ce161eff121ddf776bb62e57f02a6759dc
-
SHA256
f35f3521db0090fbc27d9efbbcb14775ea902e45a9d9fa038488b4d11e175c08
-
SHA512
9a6b6b370817820f4e068ba2be958848d09059dc0970124433bc9872791bc2b12d9f2dd4725221bbaeefd199d3fa2a63389c5bbf6ac5b064a5cab5907a991837
-
SSDEEP
3072:sF5RgjZh7gpk57/MbVelsxoNTen1v/HuxbIXU89J3WgMh8DH6:m52j4pk5zMbVO6/HUIXU8KgMyD
Malware Config
Extracted
dridex
40111
188.226.199.7:443
46.101.216.218:8172
178.254.33.197:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2772-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2772 2712 rundll32.exe 30 PID 2712 wrote to memory of 2772 2712 rundll32.exe 30 PID 2712 wrote to memory of 2772 2712 rundll32.exe 30 PID 2712 wrote to memory of 2772 2712 rundll32.exe 30 PID 2712 wrote to memory of 2772 2712 rundll32.exe 30 PID 2712 wrote to memory of 2772 2712 rundll32.exe 30 PID 2712 wrote to memory of 2772 2712 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f35f3521db0090fbc27d9efbbcb14775ea902e45a9d9fa038488b4d11e175c08.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f35f3521db0090fbc27d9efbbcb14775ea902e45a9d9fa038488b4d11e175c08.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2772
-