Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29.dll
-
Size
158KB
-
MD5
c6fc3275bc94bea5f7dbe4f8be6d933a
-
SHA1
7bfd40286ece701c66ab27f203f371ffd991cc31
-
SHA256
b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29
-
SHA512
af71447b7be36991c7afa8f550afc52c8af3e542824c30454ec4cdfb75de071392540e59752b3dabe45500cbd3c6e6c77a24a5029d2800cbdcfe6cdced656e84
-
SSDEEP
3072:4iFieJeVDC5PIh/31VeSDH2jW+zsKWncDlRe0PLDt:DeAU/TeSH26cs+7
Malware Config
Extracted
dridex
40111
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/4836-1-0x0000000074FC0000-0x0000000074FED000-memory.dmp dridex_ldr behavioral2/memory/4836-4-0x0000000074FC0000-0x0000000074FED000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4836 4120 rundll32.exe 82 PID 4120 wrote to memory of 4836 4120 rundll32.exe 82 PID 4120 wrote to memory of 4836 4120 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:4836
-