Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_459e916e29d680d601669919ee2d4f55dfac8c705a6c4d8304c18390527f6d3d.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_459e916e29d680d601669919ee2d4f55dfac8c705a6c4d8304c18390527f6d3d.dll
-
Size
160KB
-
MD5
d4a712d3155e504cafd8c9d2d5aa5d70
-
SHA1
15241eeb9c13f38493414740e246a1b9b609a69e
-
SHA256
459e916e29d680d601669919ee2d4f55dfac8c705a6c4d8304c18390527f6d3d
-
SHA512
ef1f887b2177fd13b872b38b10de78b108809bb8ef1fe3ce29ed00766d847e7217c8bc93c303ebdfb1835609e2914d61eba410e4c365c49077bcdbbc48511790
-
SSDEEP
3072:Cu5RgjZh7gpk57/MbVelsxoNTen1v/HuxbIXU89J3WgMh8DH6:/52j4pk5zMbVO6/HUIXU8KgMyD
Malware Config
Extracted
dridex
40111
188.226.199.7:443
46.101.216.218:8172
178.254.33.197:2303
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2052-1-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2052 2360 rundll32.exe 31 PID 2360 wrote to memory of 2052 2360 rundll32.exe 31 PID 2360 wrote to memory of 2052 2360 rundll32.exe 31 PID 2360 wrote to memory of 2052 2360 rundll32.exe 31 PID 2360 wrote to memory of 2052 2360 rundll32.exe 31 PID 2360 wrote to memory of 2052 2360 rundll32.exe 31 PID 2360 wrote to memory of 2052 2360 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_459e916e29d680d601669919ee2d4f55dfac8c705a6c4d8304c18390527f6d3d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_459e916e29d680d601669919ee2d4f55dfac8c705a6c4d8304c18390527f6d3d.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2052
-