Analysis
-
max time kernel
52s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9d9b55c642c47a1b17ab66cd358dc4d40c8da84500e856a654ada16940dc6096.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_9d9b55c642c47a1b17ab66cd358dc4d40c8da84500e856a654ada16940dc6096.dll
-
Size
204KB
-
MD5
13fa28d466cfd4cf5763a29f9d80315a
-
SHA1
f79a0da12e21aad20bd213138fe419ac33c8c24e
-
SHA256
9d9b55c642c47a1b17ab66cd358dc4d40c8da84500e856a654ada16940dc6096
-
SHA512
ec9427c30302380c6f1dfb0a7d9d474309333e9046b7c4f5cfa9898885fac8bd83f9e151cb217553e0b79af61aae399b993cf31e4b9bbbaa8ae9fc8e749ba66f
-
SSDEEP
3072:d6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:dZuX6pEaeEDheWa+Jc9bhorfTw
Malware Config
Extracted
dridex
40111
45.58.56.12:443
162.241.54.59:6601
51.91.76.89:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3144-1-0x0000000075780000-0x00000000757B5000-memory.dmp dridex_ldr behavioral2/memory/3144-4-0x0000000075780000-0x00000000757B5000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3144 3028 rundll32.exe 83 PID 3028 wrote to memory of 3144 3028 rundll32.exe 83 PID 3028 wrote to memory of 3144 3028 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d9b55c642c47a1b17ab66cd358dc4d40c8da84500e856a654ada16940dc6096.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d9b55c642c47a1b17ab66cd358dc4d40c8da84500e856a654ada16940dc6096.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3144
-