Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 11:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a0cd9337944c56930ef6017d5ba105c2.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a0cd9337944c56930ef6017d5ba105c2.dll
-
Size
608KB
-
MD5
a0cd9337944c56930ef6017d5ba105c2
-
SHA1
b594125bffe24ef1d75e6298fe04607d6ee730fe
-
SHA256
9bc7a09197b831cabb805ccf254287fa1dcf4f8d342d334ce6271028b0e3c645
-
SHA512
a04a610cf0f0aef40e9e1cd50b4502709a84efd3e45bc32a52760338c61b6d1aaaccca620771ef9d6df33be027d8b6c41c2609a7544392f049e5e950af3f82c6
-
SSDEEP
12288:mZGQdqOGg1JqydLqQSeCqsVK8kPRGO35N9mVtzXc6:mZ0kWjeCVVK8kP9N9ox
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 15 3724 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3724 3024 rundll32.exe 85 PID 3024 wrote to memory of 3724 3024 rundll32.exe 85 PID 3024 wrote to memory of 3724 3024 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0cd9337944c56930ef6017d5ba105c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0cd9337944c56930ef6017d5ba105c2.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3724
-