Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 03:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_459e34ac9d3da48b4653ae43c5027730.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_459e34ac9d3da48b4653ae43c5027730.dll
-
Size
608KB
-
MD5
459e34ac9d3da48b4653ae43c5027730
-
SHA1
39b2bf3ab157b354ae6e4ed9af2bc71769bdc026
-
SHA256
e6e11378cd641ce0ec075db2564b4a158c34e36b8beb11c0d38d236f5744b016
-
SHA512
e4b7ae74b7ba7cb49f90fb184dd548ceb747db0d23ac5014ffb70480ec07974f4613c07ca8491aabf0584261e7b610b0c8df077bcd2e78145318e5ee3471d6fe
-
SSDEEP
12288:tZGQdqOG68JqydLqQSeCqsVK8kPRGO35N9mVUzXc6:tZ0zWjeCVVK8kP9N9oY
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 692 rundll32.exe 7 692 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 272 wrote to memory of 692 272 rundll32.exe 31 PID 272 wrote to memory of 692 272 rundll32.exe 31 PID 272 wrote to memory of 692 272 rundll32.exe 31 PID 272 wrote to memory of 692 272 rundll32.exe 31 PID 272 wrote to memory of 692 272 rundll32.exe 31 PID 272 wrote to memory of 692 272 rundll32.exe 31 PID 272 wrote to memory of 692 272 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_459e34ac9d3da48b4653ae43c5027730.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_459e34ac9d3da48b4653ae43c5027730.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:692
-