Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_34da2cb8d8f894cbebd79319be1b852d.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_34da2cb8d8f894cbebd79319be1b852d.dll
-
Size
608KB
-
MD5
34da2cb8d8f894cbebd79319be1b852d
-
SHA1
67dbfb80a062172e32d140194b8e0f136cda8436
-
SHA256
a1ab0aeea4582f6fbd965eeac158b8f523607ba5168e4ece3539af70d8ab061d
-
SHA512
44e5b9bb883293dd5a94caaef962e980c4c0dcc450f1c07e90d454d35097525e74b35e3136f32e1f345fd19930a7d547735cd8f706a060fb7eafd690de2517fa
-
SSDEEP
12288:9ZGQdqOGVeJqydLqQSeCqsVK8kPRGO35N9mV6zXc6:9Z0gWjeCVVK8kP9N9oO
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 17 3172 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3172 4376 rundll32.exe 82 PID 4376 wrote to memory of 3172 4376 rundll32.exe 82 PID 4376 wrote to memory of 3172 4376 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34da2cb8d8f894cbebd79319be1b852d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34da2cb8d8f894cbebd79319be1b852d.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3172
-