Analysis
-
max time kernel
171s -
max time network
314s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 17:05
Static task
static1
Behavioral task
behavioral1
Sample
0_WPDSp.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
0_WPDSp.dll
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
4_aepdu.dll
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
4_aepdu.dll
Resource
win10-en-20210920
Behavioral task
behavioral5
Sample
8_hp8500at.dll
Resource
win7-en-20211014
General
-
Target
8_hp8500at.dll
-
Size
180KB
-
MD5
f8c801f32b822d210bbb788407ed29cf
-
SHA1
bc6b2888442a55b42d4aadf563a7383cafe20de5
-
SHA256
adbd74fa44708c118685b0798bc9e27e0fd50d027a22bbf6328da02875cb18de
-
SHA512
e5b03e1638ab04fb014683848fd4f4fb417e371b6c182c07e7f9c9589f5c95f774e8d47ad2411c71f1b9027598f10fd4c405539ef1e026953f1a3e9c5612e72f
Malware Config
Extracted
dridex
22201
212.237.17.99:443
176.28.17.160:6602
51.254.140.238:8333
Signatures
-
Processes:
resource yara_rule behavioral6/memory/3564-116-0x0000000074160000-0x000000007418F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 436 3564 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 436 WerFault.exe Token: SeBackupPrivilege 436 WerFault.exe Token: SeDebugPrivilege 436 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2608 wrote to memory of 3564 2608 rundll32.exe rundll32.exe PID 2608 wrote to memory of 3564 2608 rundll32.exe rundll32.exe PID 2608 wrote to memory of 3564 2608 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8_hp8500at.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8_hp8500at.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 6243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken