Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 02:53
Static task
static1
Behavioral task
behavioral1
Sample
b18028ac07b48288dd041e9b3e29f4fd459f70b8a3e4ca81d37aee68a9711115.dll
Resource
win7-20220718-en
windows7-x64
3 signatures
150 seconds
General
-
Target
b18028ac07b48288dd041e9b3e29f4fd459f70b8a3e4ca81d37aee68a9711115.dll
-
Size
312KB
-
MD5
1ce34090fcf71f9238fd09c5e8e1812b
-
SHA1
cb64a6a8f52e7aec11cba5828622823b0ea09013
-
SHA256
b18028ac07b48288dd041e9b3e29f4fd459f70b8a3e4ca81d37aee68a9711115
-
SHA512
685e9879ec156c3b8c3ae9aca2d9deda0fdc31f64f9c59e609fac3896bff3ba976684c3e6423137c5c55be318bca087b60e3e04859ade5934ef349bbf39759e4
Malware Config
Extracted
Family
dridex
C2
194.99.22.193:443
178.63.67.20:691
75.127.14.171:3389
134.213.221.29:8443
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1092-57-0x00000000733F0000-0x0000000073411000-memory.dmp dridex_ldr behavioral1/memory/1092-58-0x00000000733F0000-0x0000000073D53000-memory.dmp dridex_ldr behavioral1/memory/1092-61-0x00000000733F0000-0x0000000073D53000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2008 wrote to memory of 1092 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 1092 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 1092 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 1092 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 1092 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 1092 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 1092 2008 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b18028ac07b48288dd041e9b3e29f4fd459f70b8a3e4ca81d37aee68a9711115.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b18028ac07b48288dd041e9b3e29f4fd459f70b8a3e4ca81d37aee68a9711115.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1092-54-0x0000000000000000-mapping.dmp
-
memory/1092-55-0x0000000075761000-0x0000000075763000-memory.dmpFilesize
8KB
-
memory/1092-56-0x00000000733F0000-0x0000000073D53000-memory.dmpFilesize
9.4MB
-
memory/1092-57-0x00000000733F0000-0x0000000073411000-memory.dmpFilesize
132KB
-
memory/1092-58-0x00000000733F0000-0x0000000073D53000-memory.dmpFilesize
9.4MB
-
memory/1092-59-0x00000000733F0000-0x0000000073D53000-memory.dmpFilesize
9.4MB
-
memory/1092-61-0x00000000733F0000-0x0000000073D53000-memory.dmpFilesize
9.4MB