Analysis
-
max time kernel
53s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29.dll
-
Size
158KB
-
MD5
c6fc3275bc94bea5f7dbe4f8be6d933a
-
SHA1
7bfd40286ece701c66ab27f203f371ffd991cc31
-
SHA256
b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29
-
SHA512
af71447b7be36991c7afa8f550afc52c8af3e542824c30454ec4cdfb75de071392540e59752b3dabe45500cbd3c6e6c77a24a5029d2800cbdcfe6cdced656e84
-
SSDEEP
3072:4iFieJeVDC5PIh/31VeSDH2jW+zsKWncDlRe0PLDt:DeAU/TeSH26cs+7
Malware Config
Extracted
dridex
40111
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2524-1-0x00000000744D0000-0x00000000744FD000-memory.dmp dridex_ldr behavioral1/memory/2524-2-0x00000000744D0000-0x00000000744FD000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2524 2504 rundll32.exe 30 PID 2504 wrote to memory of 2524 2504 rundll32.exe 30 PID 2504 wrote to memory of 2524 2504 rundll32.exe 30 PID 2504 wrote to memory of 2524 2504 rundll32.exe 30 PID 2504 wrote to memory of 2524 2504 rundll32.exe 30 PID 2504 wrote to memory of 2524 2504 rundll32.exe 30 PID 2504 wrote to memory of 2524 2504 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2524
-