Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_492cd2cfd4dc7c8fd4303f11504083be99ee198b2ea2f53e86c8428cccf9fb2b.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_492cd2cfd4dc7c8fd4303f11504083be99ee198b2ea2f53e86c8428cccf9fb2b.dll
-
Size
184KB
-
MD5
fa5acf8066dc96bff4cb1a21393a7db1
-
SHA1
25f6f7c2c75308eef400d3740233d6bbcb0a58a9
-
SHA256
492cd2cfd4dc7c8fd4303f11504083be99ee198b2ea2f53e86c8428cccf9fb2b
-
SHA512
3b8d710b242783f8ff59ae6657d4f74de46d53de21b22b1ab712e53a62a7e3b6814a3585eaf880fa69b20fca6b1f1e9f568dd0e2c4e5c9ba9203ce72f8fb28b1
-
SSDEEP
3072:B92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTYrLA:B9NSMOEpQ1Q3ODAr+Vk
Malware Config
Extracted
dridex
22203
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4196-1-0x00000000752D0000-0x00000000752FF000-memory.dmp dridex_ldr behavioral2/memory/4196-3-0x00000000752D0000-0x00000000752FF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3032 4196 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1912 wrote to memory of 4196 1912 rundll32.exe 82 PID 1912 wrote to memory of 4196 1912 rundll32.exe 82 PID 1912 wrote to memory of 4196 1912 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_492cd2cfd4dc7c8fd4303f11504083be99ee198b2ea2f53e86c8428cccf9fb2b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_492cd2cfd4dc7c8fd4303f11504083be99ee198b2ea2f53e86c8428cccf9fb2b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 6163⤵
- Program crash
PID:3032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4196 -ip 41961⤵PID:2788