Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2022 06:23
Static task
static1
Behavioral task
behavioral1
Sample
3c4be1285b8069c2db590c1de6a77adef3198cc9c3f323aef5de73753421c2e8.dll
Resource
win7-20220812-en
General
-
Target
3c4be1285b8069c2db590c1de6a77adef3198cc9c3f323aef5de73753421c2e8.dll
-
Size
244KB
-
MD5
94395a29f0cf16cc80c2a1a4aee0d8d4
-
SHA1
c40574963b019d49fae4cffcefd970edf3957826
-
SHA256
3c4be1285b8069c2db590c1de6a77adef3198cc9c3f323aef5de73753421c2e8
-
SHA512
ca4fbefdfd4437f01d11545a28a3d21873f417a237a2e4a7e5c10abc2d59abbe5ffcdb146144e1c7dcfb304b9d747b119c8b1f0e72ac312c0a029cf12985d9f8
-
SSDEEP
3072:2EmMHLYjs2g+ciAlYDyOWIsh0pMf+66C4FxTdCU1byGkGcyXDTEXlDkr/:9rHL+tg+cGyZzheB6b4fJCwb8d0E
Malware Config
Extracted
Family |
dridex |
Botnet |
22201 |
C2 |
195.154.146.84:443 45.56.121.87:8116 157.245.222.44:5723 |
rc4.plain |
|
rc4.plain |
|
Signatures
-
Processes:
resource yara_rule behavioral2/memory/5008-138-0x0000000075190000-0x00000000751BF000-memory.dmp dridex_ldr behavioral2/memory/5008-139-0x0000000075190000-0x00000000751CE000-memory.dmp dridex_ldr -
Program crash ⋅ 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4756 5008 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory ⋅ 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 820 wrote to memory of 5008 820 rundll32.exe rundll32.exe PID 820 wrote to memory of 5008 820 rundll32.exe rundll32.exe PID 820 wrote to memory of 5008 820 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c4be1285b8069c2db590c1de6a77adef3198cc9c3f323aef5de73753421c2e8.dll,#1Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c4be1285b8069c2db590c1de6a77adef3198cc9c3f323aef5de73753421c2e8.dll,#1
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 620Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5008 -ip 5008
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
memory/5008-132-0x0000000000000000-mapping.dmp
-
memory/5008-133-0x0000000075190000-0x00000000751CE000-memory.dmp
-
memory/5008-137-0x0000000000320000-0x0000000000326000-memory.dmp
-
memory/5008-138-0x0000000075190000-0x00000000751BF000-memory.dmp
-
memory/5008-139-0x0000000075190000-0x00000000751CE000-memory.dmp
-
memory/5008-140-0x0000000000260000-0x0000000000266000-memory.dmp