Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 08:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_190e76d752e7c9ea750466e0549a0f53.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_190e76d752e7c9ea750466e0549a0f53.dll
-
Size
608KB
-
MD5
190e76d752e7c9ea750466e0549a0f53
-
SHA1
c2645efe7b2ea5cd64e1ce35471b8091e534967d
-
SHA256
a17b5c2a53c5eba0a985a27f8e8d3d1682710ffff2655ddbe28b71b8e320cff7
-
SHA512
479898d5be5ff28d2c248978715f8a47f13c5141568aa6f68801a3245b9ca9c94595d2ac0a793852ac72e1218f37b028fba182d388741c583f715946850ba0d5
-
SSDEEP
12288:pZGQdqOG5tJqydLqQSeCqsVK8kPRGO35N9mVBzXc6:pZ0TWjeCVVK8kP9N9ot
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2612 rundll32.exe 7 2612 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_190e76d752e7c9ea750466e0549a0f53.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_190e76d752e7c9ea750466e0549a0f53.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2612
-