Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_92570ada6fbea7fbe67889b80c0ee9e1616dd279cfe7f98d9227b48e2523ad67.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_92570ada6fbea7fbe67889b80c0ee9e1616dd279cfe7f98d9227b48e2523ad67.dll
-
Size
178KB
-
MD5
c6a1284ac6aa638e0411686ea0d4e082
-
SHA1
2e25439ce8b978efd1de5d179d48e4b9ca824985
-
SHA256
92570ada6fbea7fbe67889b80c0ee9e1616dd279cfe7f98d9227b48e2523ad67
-
SHA512
79528c7d87c94e96d02a69d14b2dbe28e404deec2531bf8263e3de3e715e040215c851d82937f00008e7576cea9be81b8829c59a8575b2e9bd0903331c75c9fe
-
SSDEEP
3072:fZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtuUucGZ2:fUAk9I4vgz/V2dulz6/hvHhG
Malware Config
Extracted
dridex
22201
142.93.223.149:443
128.199.36.62:4664
50.116.54.215:13786
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2900-0-0x0000000075140000-0x0000000075171000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_92570ada6fbea7fbe67889b80c0ee9e1616dd279cfe7f98d9227b48e2523ad67.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_92570ada6fbea7fbe67889b80c0ee9e1616dd279cfe7f98d9227b48e2523ad67.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2900
-