Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 10:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_516aad560fe2c549052bd0b2a221108a.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_516aad560fe2c549052bd0b2a221108a.dll
-
Size
608KB
-
MD5
516aad560fe2c549052bd0b2a221108a
-
SHA1
4821135bd444ce0efebd9d23ee27487d75b7d64f
-
SHA256
7d624d81fddd3c30a6c156bf798eb31fc3c68868b83f71f3ffc4ab6e964e8f09
-
SHA512
f84c2f3a5d75bcd345abe1c866caf5905076e8f53244b2ae0ede3ccf807205d82d20a9f28ba63e28bcc46e8087873e470e649614df56e27952719b9f405fbfd9
-
SSDEEP
12288:TZGQdqOGCoJqydLqQSeCqsVK8kPRGO35N9mVkzXc6:TZ0LWjeCVVK8kP9N9oo
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2768 rundll32.exe 7 2768 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2768 2756 rundll32.exe 31 PID 2756 wrote to memory of 2768 2756 rundll32.exe 31 PID 2756 wrote to memory of 2768 2756 rundll32.exe 31 PID 2756 wrote to memory of 2768 2756 rundll32.exe 31 PID 2756 wrote to memory of 2768 2756 rundll32.exe 31 PID 2756 wrote to memory of 2768 2756 rundll32.exe 31 PID 2756 wrote to memory of 2768 2756 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_516aad560fe2c549052bd0b2a221108a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_516aad560fe2c549052bd0b2a221108a.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2768
-