Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_123ba0ef466d047c7ff846348900269f6e5e825492cb0d3e2a62c0e0dac702dd.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_123ba0ef466d047c7ff846348900269f6e5e825492cb0d3e2a62c0e0dac702dd.dll
-
Size
160KB
-
MD5
a548bad5a1757dce23e442b9be0cb7df
-
SHA1
5ef8a7b6984ed4a5d7df63be3fa9d57a7d779945
-
SHA256
123ba0ef466d047c7ff846348900269f6e5e825492cb0d3e2a62c0e0dac702dd
-
SHA512
92fa08b5cc1a5faafb405bf2a3c2a8bc231efafeb3a687d106d92c4cb4b92ca553fd466839d14a667942522ee73f96cd86c19c3951a7b244a438d8bbbb95cb72
-
SSDEEP
3072:Wu5RgjZh7gpk57/MbVelsxoNTen1v/HuxbIXU89J3WgMh8DH6:b52j4pk5zMbVO6/HUIXU8KgMyD
Malware Config
Extracted
dridex
40111
188.226.199.7:443
46.101.216.218:8172
178.254.33.197:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2056-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2056 2228 rundll32.exe 30 PID 2228 wrote to memory of 2056 2228 rundll32.exe 30 PID 2228 wrote to memory of 2056 2228 rundll32.exe 30 PID 2228 wrote to memory of 2056 2228 rundll32.exe 30 PID 2228 wrote to memory of 2056 2228 rundll32.exe 30 PID 2228 wrote to memory of 2056 2228 rundll32.exe 30 PID 2228 wrote to memory of 2056 2228 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_123ba0ef466d047c7ff846348900269f6e5e825492cb0d3e2a62c0e0dac702dd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_123ba0ef466d047c7ff846348900269f6e5e825492cb0d3e2a62c0e0dac702dd.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2056
-