Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_196f8d553bdb3842c2c6a57b9ca01784.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_196f8d553bdb3842c2c6a57b9ca01784.dll
-
Size
664KB
-
MD5
196f8d553bdb3842c2c6a57b9ca01784
-
SHA1
8071ba8f081dbc3333aec443b6ab2a841f174663
-
SHA256
0b4775420df531ab86787250e980ecf279b9ab41b9c62a3028ec41e6ea2ac6a3
-
SHA512
21d5a33d4e6148706b6d1840d022caa19efdccf9717cbd06fb91986fcd4e1af2b88625cfbe0e3fc2d92116649ff04e59a59734798cefb9320c852337333f8a36
-
SSDEEP
12288:D/0Qzqf0eqi48DM+6TFKywVt6PbEYU0eyJTT/Mu9oV01uroaEPG:b0zhq8n6TFKywvCbEOxDMu9oyBaEPG
Malware Config
Extracted
dridex
10222
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 21 3640 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3640 1552 rundll32.exe 82 PID 1552 wrote to memory of 3640 1552 rundll32.exe 82 PID 1552 wrote to memory of 3640 1552 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_196f8d553bdb3842c2c6a57b9ca01784.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_196f8d553bdb3842c2c6a57b9ca01784.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3640
-