Analysis
-
max time kernel
47s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
22-09-2022 06:30
Static task
static1
Behavioral task
behavioral1
Sample
849d3eb659fc41ba57098e5e48d694f5c4389cdb7157642b47fc1b0c6d75c00b.dll
Resource
win7-20220901-en
General
-
Target
849d3eb659fc41ba57098e5e48d694f5c4389cdb7157642b47fc1b0c6d75c00b.dll
-
Size
244KB
-
MD5
527acdff5f6083b091e9361ecc9bed36
-
SHA1
2028f4ccb2e8b95f296a3ea61d6be597303efba3
-
SHA256
849d3eb659fc41ba57098e5e48d694f5c4389cdb7157642b47fc1b0c6d75c00b
-
SHA512
c691c182fd6fc03ae75d602bf4c6466128e16803cbfd8d55db9f3e41c35b602fd5214db03d0fd8a8e8d7bc58cf82f97f246ff8411c763b7a8cf586b34c9d0049
-
SSDEEP
3072:dmMHLYjs2g+ciAlYDyOWIsh0pMf+66C4FxTdCU1byGkGcyXDTERlDkr/:drHL+tg+cGyZzheB6b4fJCwb8d0E
Malware Config
Extracted
dridex
22201
195.154.146.84:443
45.56.121.87:8116
157.245.222.44:5723
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1972-62-0x0000000074CC0000-0x0000000074CFE000-memory.dmp dridex_ldr behavioral1/memory/1972-61-0x0000000074CC0000-0x0000000074CEF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 556 1972 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1880 wrote to memory of 1972 1880 rundll32.exe rundll32.exe PID 1880 wrote to memory of 1972 1880 rundll32.exe rundll32.exe PID 1880 wrote to memory of 1972 1880 rundll32.exe rundll32.exe PID 1880 wrote to memory of 1972 1880 rundll32.exe rundll32.exe PID 1880 wrote to memory of 1972 1880 rundll32.exe rundll32.exe PID 1880 wrote to memory of 1972 1880 rundll32.exe rundll32.exe PID 1880 wrote to memory of 1972 1880 rundll32.exe rundll32.exe PID 1972 wrote to memory of 556 1972 rundll32.exe WerFault.exe PID 1972 wrote to memory of 556 1972 rundll32.exe WerFault.exe PID 1972 wrote to memory of 556 1972 rundll32.exe WerFault.exe PID 1972 wrote to memory of 556 1972 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\849d3eb659fc41ba57098e5e48d694f5c4389cdb7157642b47fc1b0c6d75c00b.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\849d3eb659fc41ba57098e5e48d694f5c4389cdb7157642b47fc1b0c6d75c00b.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 2523⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/556-63-0x0000000000000000-mapping.dmp
-
memory/1972-54-0x0000000000000000-mapping.dmp
-
memory/1972-55-0x0000000075D71000-0x0000000075D73000-memory.dmpFilesize
8KB
-
memory/1972-56-0x0000000074CC0000-0x0000000074CFE000-memory.dmpFilesize
248KB
-
memory/1972-60-0x00000000000C0000-0x00000000000C6000-memory.dmpFilesize
24KB
-
memory/1972-62-0x0000000074CC0000-0x0000000074CFE000-memory.dmpFilesize
248KB
-
memory/1972-61-0x0000000074CC0000-0x0000000074CEF000-memory.dmpFilesize
188KB
-
memory/1972-64-0x00000000000D0000-0x00000000000D6000-memory.dmpFilesize
24KB