Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6ef462f796ff4a62ed7f6e5bc8985a042e203f8c46ea5e727b151417850c3bef.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6ef462f796ff4a62ed7f6e5bc8985a042e203f8c46ea5e727b151417850c3bef.dll
-
Size
188KB
-
MD5
92c2d5c0afe667a254106a0685b452f0
-
SHA1
7a6186b8bf96de9b08fe66a8bf1155d2050135fc
-
SHA256
6ef462f796ff4a62ed7f6e5bc8985a042e203f8c46ea5e727b151417850c3bef
-
SHA512
28201684d4d9d27d346d5194e8a8b5c4e5370997ebee7dab24fff169f2e68f7210da9b5f1efae8ec67518b0fbed2bdaba8cb4c6ed5f7e4c4d22180e92f4f39f4
-
SSDEEP
3072:oteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:Mq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1660-1-0x0000000074C70000-0x0000000074CA0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2236 1660 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 2280 wrote to memory of 1660 2280 rundll32.exe 31 PID 1660 wrote to memory of 2236 1660 rundll32.exe 32 PID 1660 wrote to memory of 2236 1660 rundll32.exe 32 PID 1660 wrote to memory of 2236 1660 rundll32.exe 32 PID 1660 wrote to memory of 2236 1660 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ef462f796ff4a62ed7f6e5bc8985a042e203f8c46ea5e727b151417850c3bef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ef462f796ff4a62ed7f6e5bc8985a042e203f8c46ea5e727b151417850c3bef.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 3003⤵
- Program crash
PID:2236
-
-