Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2decc7a3981d168c32eb179da447964c562319ee854d96a61e15cf071b97968f.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_2decc7a3981d168c32eb179da447964c562319ee854d96a61e15cf071b97968f.dll
-
Size
188KB
-
MD5
0d86d78b8908ab7b2e9d29c430af3209
-
SHA1
9d950a1cadafcb092713eedc8f2260826888bce4
-
SHA256
2decc7a3981d168c32eb179da447964c562319ee854d96a61e15cf071b97968f
-
SHA512
7eb516ca0a4c130e464c1a25d3956e6efca1aa43f5e23cb8b13e9fb92787b1c08405780c93563932e869ae914cb855a6648677f691c12df50776245cc9ddc9f3
-
SSDEEP
3072:rteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzI9qM:jq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2032-0-0x0000000074DC0000-0x0000000074DF0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1328 2032 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2032 1792 rundll32.exe 30 PID 1792 wrote to memory of 2032 1792 rundll32.exe 30 PID 1792 wrote to memory of 2032 1792 rundll32.exe 30 PID 1792 wrote to memory of 2032 1792 rundll32.exe 30 PID 1792 wrote to memory of 2032 1792 rundll32.exe 30 PID 1792 wrote to memory of 2032 1792 rundll32.exe 30 PID 1792 wrote to memory of 2032 1792 rundll32.exe 30 PID 2032 wrote to memory of 1328 2032 rundll32.exe 32 PID 2032 wrote to memory of 1328 2032 rundll32.exe 32 PID 2032 wrote to memory of 1328 2032 rundll32.exe 32 PID 2032 wrote to memory of 1328 2032 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2decc7a3981d168c32eb179da447964c562319ee854d96a61e15cf071b97968f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2decc7a3981d168c32eb179da447964c562319ee854d96a61e15cf071b97968f.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 3003⤵
- Program crash
PID:1328
-
-