Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1f39c0cb7f451cb9b411636df6eab6c293429bc29263a2b31a6212101b29d850.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1f39c0cb7f451cb9b411636df6eab6c293429bc29263a2b31a6212101b29d850.dll
-
Size
184KB
-
MD5
df75f05f80b8307a82579f7302320817
-
SHA1
b6d80426be86376ab31e6affaf205490688b4b94
-
SHA256
1f39c0cb7f451cb9b411636df6eab6c293429bc29263a2b31a6212101b29d850
-
SHA512
4a3ce155bf88a5a925c45aedb4c1b778f9d9b3174e3a6b8f688840448c8e8348d49ff2569275804a7e760a614166c7319cab1643cf5de211e08f4f236e0abde5
-
SSDEEP
3072:9W8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngmeWx9ixCH0u:48qh+66QsRdNiBW/06ngmeWexC
Malware Config
Extracted
dridex
22203
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4728-0-0x0000000075760000-0x0000000075790000-memory.dmp dridex_ldr behavioral2/memory/4728-3-0x0000000075760000-0x0000000075790000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2032 4728 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4728 4972 rundll32.exe 83 PID 4972 wrote to memory of 4728 4972 rundll32.exe 83 PID 4972 wrote to memory of 4728 4972 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1f39c0cb7f451cb9b411636df6eab6c293429bc29263a2b31a6212101b29d850.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1f39c0cb7f451cb9b411636df6eab6c293429bc29263a2b31a6212101b29d850.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 6163⤵
- Program crash
PID:2032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4728 -ip 47281⤵PID:972