Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a8c48327067254d4ac6a874c4055ffd76e48a59f177acb1d7025dedd9b2aeea6.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a8c48327067254d4ac6a874c4055ffd76e48a59f177acb1d7025dedd9b2aeea6.dll
-
Size
184KB
-
MD5
e46eda090d40f37376174682fd2d97be
-
SHA1
5e0fc24e34933e02c2c4b858713bb9c9e9e8fa6e
-
SHA256
a8c48327067254d4ac6a874c4055ffd76e48a59f177acb1d7025dedd9b2aeea6
-
SHA512
1869bdeac8db699848ccb5c2115078de86371dca258818951be9d301a0702e3d30ccc77cb27de6e5a909ceb5c05ceab3e0a0ff3926188abe9095d2c2ce146c8d
-
SSDEEP
3072:aJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jka//2uFrSc:7fYOX+wTScR/Xzku9LVwfuG
Malware Config
Extracted
dridex
22201
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/1848-1-0x00000000756F0000-0x000000007571F000-memory.dmp dridex_ldr behavioral2/memory/1848-2-0x00000000756F0000-0x000000007571F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1084 1848 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 1848 3604 rundll32.exe 83 PID 3604 wrote to memory of 1848 3604 rundll32.exe 83 PID 3604 wrote to memory of 1848 3604 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8c48327067254d4ac6a874c4055ffd76e48a59f177acb1d7025dedd9b2aeea6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8c48327067254d4ac6a874c4055ffd76e48a59f177acb1d7025dedd9b2aeea6.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 6163⤵
- Program crash
PID:1084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1848 -ip 18481⤵PID:1536