Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 21:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c004bb9c7c020b93f1155e3d776b94c95e3182a595af7db8a3d9621d89ebd914.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_c004bb9c7c020b93f1155e3d776b94c95e3182a595af7db8a3d9621d89ebd914.dll
-
Size
161KB
-
MD5
d1a7d6890c1cad88722e582e19809c55
-
SHA1
b66c1478cbbec729f08e77c00e4a5dd858b4e94b
-
SHA256
c004bb9c7c020b93f1155e3d776b94c95e3182a595af7db8a3d9621d89ebd914
-
SHA512
98947f0cdd9eca14fc3da99b63ccbaba01f11055dc5c9c6d7093ed8ebce221a92d1f647adeacdbc3b2b337b04ebbb7207c24010e4a6c74f3b8980cc6e5c9b157
-
SSDEEP
3072:Gk2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/Yp8AF:wG3rUvoU4JE/Wzan9T7B/CKsL/Yy
Malware Config
Extracted
dridex
40112
193.200.130.181:443
95.138.161.226:2303
167.114.113.13:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2312-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2312 1748 rundll32.exe 30 PID 1748 wrote to memory of 2312 1748 rundll32.exe 30 PID 1748 wrote to memory of 2312 1748 rundll32.exe 30 PID 1748 wrote to memory of 2312 1748 rundll32.exe 30 PID 1748 wrote to memory of 2312 1748 rundll32.exe 30 PID 1748 wrote to memory of 2312 1748 rundll32.exe 30 PID 1748 wrote to memory of 2312 1748 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c004bb9c7c020b93f1155e3d776b94c95e3182a595af7db8a3d9621d89ebd914.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c004bb9c7c020b93f1155e3d776b94c95e3182a595af7db8a3d9621d89ebd914.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2312
-