Analysis
-
max time kernel
300s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
21-10-2021 17:05
Static task
static1
Behavioral task
behavioral1
Sample
0_WPDSp.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
0_WPDSp.dll
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
4_aepdu.dll
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
4_aepdu.dll
Resource
win10-en-20210920
Behavioral task
behavioral5
Sample
8_hp8500at.dll
Resource
win7-en-20211014
General
-
Target
8_hp8500at.dll
-
Size
180KB
-
MD5
f8c801f32b822d210bbb788407ed29cf
-
SHA1
bc6b2888442a55b42d4aadf563a7383cafe20de5
-
SHA256
adbd74fa44708c118685b0798bc9e27e0fd50d027a22bbf6328da02875cb18de
-
SHA512
e5b03e1638ab04fb014683848fd4f4fb417e371b6c182c07e7f9c9589f5c95f774e8d47ad2411c71f1b9027598f10fd4c405539ef1e026953f1a3e9c5612e72f
Malware Config
Extracted
dridex
22201
212.237.17.99:443
176.28.17.160:6602
51.254.140.238:8333
Signatures
-
Processes:
resource yara_rule behavioral5/memory/1668-57-0x0000000074E00000-0x0000000074E2F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1476 1668 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1476 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1296 wrote to memory of 1668 1296 rundll32.exe rundll32.exe PID 1296 wrote to memory of 1668 1296 rundll32.exe rundll32.exe PID 1296 wrote to memory of 1668 1296 rundll32.exe rundll32.exe PID 1296 wrote to memory of 1668 1296 rundll32.exe rundll32.exe PID 1296 wrote to memory of 1668 1296 rundll32.exe rundll32.exe PID 1296 wrote to memory of 1668 1296 rundll32.exe rundll32.exe PID 1296 wrote to memory of 1668 1296 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1476 1668 rundll32.exe WerFault.exe PID 1668 wrote to memory of 1476 1668 rundll32.exe WerFault.exe PID 1668 wrote to memory of 1476 1668 rundll32.exe WerFault.exe PID 1668 wrote to memory of 1476 1668 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8_hp8500at.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8_hp8500at.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 2523⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1476-59-0x0000000000000000-mapping.dmp
-
memory/1476-61-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/1668-55-0x0000000000000000-mapping.dmp
-
memory/1668-56-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB
-
memory/1668-57-0x0000000074E00000-0x0000000074E2F000-memory.dmpFilesize
188KB
-
memory/1668-60-0x0000000000150000-0x0000000000156000-memory.dmpFilesize
24KB