Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_58137b2fb4ea066eddfb9cda722f4b82007bc8fa5907a3563d0e7dad125cce9a.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_58137b2fb4ea066eddfb9cda722f4b82007bc8fa5907a3563d0e7dad125cce9a.dll
-
Size
188KB
-
MD5
12ac01eb6e1a31af988565ee2d380306
-
SHA1
10c290f983d8e93dc8cea742ad98160048ec0cd2
-
SHA256
58137b2fb4ea066eddfb9cda722f4b82007bc8fa5907a3563d0e7dad125cce9a
-
SHA512
47209d92aac702bfcf681c13fdba3cfafce2bd437c3517562a15aabc337044fbf54404f3e6b592746443ecde9e25a2dbee69b80f93704ca1a592a4a9522c51ae
-
SSDEEP
3072:rteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzy9qM:jq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/844-1-0x00000000758F0000-0x0000000075920000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4820 844 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 844 4636 rundll32.exe 82 PID 4636 wrote to memory of 844 4636 rundll32.exe 82 PID 4636 wrote to memory of 844 4636 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_58137b2fb4ea066eddfb9cda722f4b82007bc8fa5907a3563d0e7dad125cce9a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_58137b2fb4ea066eddfb9cda722f4b82007bc8fa5907a3563d0e7dad125cce9a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 6923⤵
- Program crash
PID:4820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 844 -ip 8441⤵PID:4048