Analysis
-
max time kernel
62s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16.dll
-
Size
159KB
-
MD5
e674c7faf508bff9625d35a0661bb887
-
SHA1
240a00c6fa097075c2644456b665820bd988199a
-
SHA256
0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16
-
SHA512
2db6981109be177e46417c624089b9654180c263494788841889949b24799ec40248cb9d0887603648f815cc85eb700e7ad8bde73e02d2e8415953ac007040f1
-
SSDEEP
3072:6s8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYXZwd:+nClX8WZ7/HrRCADTR0VldZw
Malware Config
Extracted
dridex
22203
78.46.73.125:443
185.148.168.26:2303
66.113.160.126:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/3020-1-0x0000000010000000-0x000000001002D000-memory.dmp dridex_ldr behavioral1/memory/3020-2-0x0000000010000000-0x000000001002D000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30 PID 2696 wrote to memory of 3020 2696 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3020
-