Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_34452e9645c34ddf7c78a77d9a47bca6.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_34452e9645c34ddf7c78a77d9a47bca6.dll
-
Size
608KB
-
MD5
34452e9645c34ddf7c78a77d9a47bca6
-
SHA1
ae392ed9650e9363d785b62fd71c116861cd3a5b
-
SHA256
608443ad35cfda5ca4ebfa1409b44a6aeefe74a3953e8140511f1f5c08c8052d
-
SHA512
bbb2464ac1b948262b1b984af372725efc04e0ad4fc39a9e33962b4afe0910f53b76e7a3ab258a30b0088759633801913023c0b5ae1da1e372cca7c5e4f746da
-
SSDEEP
12288:2ZGQdqOGxIJqydLqQSeCqsVK8kPRGO35N9mVczXc6:2Z0CWjeCVVK8kP9N9ow
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2680 rundll32.exe 7 2680 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2680 3068 rundll32.exe 30 PID 3068 wrote to memory of 2680 3068 rundll32.exe 30 PID 3068 wrote to memory of 2680 3068 rundll32.exe 30 PID 3068 wrote to memory of 2680 3068 rundll32.exe 30 PID 3068 wrote to memory of 2680 3068 rundll32.exe 30 PID 3068 wrote to memory of 2680 3068 rundll32.exe 30 PID 3068 wrote to memory of 2680 3068 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34452e9645c34ddf7c78a77d9a47bca6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34452e9645c34ddf7c78a77d9a47bca6.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2680
-