Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_22b0bc7b172d8893a7b054e2721c8a8e02b690306a968807fb6c63db03f34b39.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_22b0bc7b172d8893a7b054e2721c8a8e02b690306a968807fb6c63db03f34b39.dll
-
Size
160KB
-
MD5
b1534e5095a32129d2f3c75fc2ba722e
-
SHA1
386df4fe06e72953bed1847b993a9e955bc33edd
-
SHA256
22b0bc7b172d8893a7b054e2721c8a8e02b690306a968807fb6c63db03f34b39
-
SHA512
0854b74dc7f560bca5ec36c5f7a72e8f278df1f1307c1e34a223beb9b419c6730bafad47c891c20023db8a200420a7808c458a685defa0c8caee0fa75dd67f4d
-
SSDEEP
3072:TNOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:Q8mnT7Fmsans1+0Hw7/t
Malware Config
Extracted
dridex
40111
185.148.168.240:443
162.216.125.131:2303
193.200.130.178:8172
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1600-1-0x0000000074F40000-0x0000000074F6E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1272 1600 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1600 1304 rundll32.exe 30 PID 1304 wrote to memory of 1600 1304 rundll32.exe 30 PID 1304 wrote to memory of 1600 1304 rundll32.exe 30 PID 1304 wrote to memory of 1600 1304 rundll32.exe 30 PID 1304 wrote to memory of 1600 1304 rundll32.exe 30 PID 1304 wrote to memory of 1600 1304 rundll32.exe 30 PID 1304 wrote to memory of 1600 1304 rundll32.exe 30 PID 1600 wrote to memory of 1272 1600 rundll32.exe 32 PID 1600 wrote to memory of 1272 1600 rundll32.exe 32 PID 1600 wrote to memory of 1272 1600 rundll32.exe 32 PID 1600 wrote to memory of 1272 1600 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_22b0bc7b172d8893a7b054e2721c8a8e02b690306a968807fb6c63db03f34b39.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_22b0bc7b172d8893a7b054e2721c8a8e02b690306a968807fb6c63db03f34b39.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 2563⤵
- Program crash
PID:1272
-
-