Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 10:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_516aad560fe2c549052bd0b2a221108a.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_516aad560fe2c549052bd0b2a221108a.dll
-
Size
608KB
-
MD5
516aad560fe2c549052bd0b2a221108a
-
SHA1
4821135bd444ce0efebd9d23ee27487d75b7d64f
-
SHA256
7d624d81fddd3c30a6c156bf798eb31fc3c68868b83f71f3ffc4ab6e964e8f09
-
SHA512
f84c2f3a5d75bcd345abe1c866caf5905076e8f53244b2ae0ede3ccf807205d82d20a9f28ba63e28bcc46e8087873e470e649614df56e27952719b9f405fbfd9
-
SSDEEP
12288:TZGQdqOGCoJqydLqQSeCqsVK8kPRGO35N9mVkzXc6:TZ0LWjeCVVK8kP9N9oo
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 13 4656 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4656 4016 rundll32.exe 82 PID 4016 wrote to memory of 4656 4016 rundll32.exe 82 PID 4016 wrote to memory of 4656 4016 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_516aad560fe2c549052bd0b2a221108a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_516aad560fe2c549052bd0b2a221108a.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:4656
-