Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 06:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1476f9610cc04f9270cf943c4fda74a9.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1476f9610cc04f9270cf943c4fda74a9.dll
-
Size
608KB
-
MD5
1476f9610cc04f9270cf943c4fda74a9
-
SHA1
661c6e6340ef87e6772aa3adba7798cb434ad088
-
SHA256
6584ab14c05859ebf0380b9c512798b2daa13f82fbe9c5ebaf272c8e10695bdf
-
SHA512
a07d1df8adff5f2e0e1f187edf7f5909bba003b0ee7809ff6d8b853ec3c299e4e674f79519bdb3bf45e73121e62eca2d8ebe35acdf5e453f700b608d13854965
-
SSDEEP
12288:mZGQdqOGwNJqydLqQSeCqsVK8kPRGO35N9mV9zXc6:mZ0kWjeCVVK8kP9N9oB
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 16 4508 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 552 wrote to memory of 4508 552 rundll32.exe 82 PID 552 wrote to memory of 4508 552 rundll32.exe 82 PID 552 wrote to memory of 4508 552 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1476f9610cc04f9270cf943c4fda74a9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1476f9610cc04f9270cf943c4fda74a9.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:4508
-