Analysis
-
max time kernel
51s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-06-2022 16:51
Static task
static1
Behavioral task
behavioral1
Sample
OfaKFkkklgbtq.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
OfaKFkkklgbtq.dll
-
Size
512KB
-
MD5
3e17c7d3afa01e26d7f56215da2472ed
-
SHA1
0195707de8e8b383c779e898b346cd8612ead5bb
-
SHA256
5dc64df3cca54165dc493a27a09243962a8c52c3f2a4118b24f620914f2a9f38
-
SHA512
d555c9a761213492af7bdf1eb3ec37191715f40c23a3e2f3883c117c719c77c680b7e1550c689d04bd371656327e3d74c16ac0487d388c84c265879063182834
Malware Config
Extracted
Family
dridex
Botnet
22203
C2
51.159.52.196:443
134.209.247.135:6602
194.233.68.48:5228
89.31.56.58:593
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1372-57-0x0000000074D40000-0x0000000074DC1000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1088 1372 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1712 wrote to memory of 1372 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1372 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1372 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1372 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1372 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1372 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1372 1712 rundll32.exe rundll32.exe PID 1372 wrote to memory of 1088 1372 rundll32.exe WerFault.exe PID 1372 wrote to memory of 1088 1372 rundll32.exe WerFault.exe PID 1372 wrote to memory of 1088 1372 rundll32.exe WerFault.exe PID 1372 wrote to memory of 1088 1372 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\OfaKFkkklgbtq.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\OfaKFkkklgbtq.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 3003⤵
- Program crash
PID:1088