Analysis
-
max time kernel
77s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2022 06:42
Static task
static1
Behavioral task
behavioral1
Sample
975dc7061e68f49f1076380ab533d07414a4c4de75ce8ba12c769881c5f619c5.dll
Resource
win7-20220901-en
General
-
Target
975dc7061e68f49f1076380ab533d07414a4c4de75ce8ba12c769881c5f619c5.dll
-
Size
244KB
-
MD5
4500ca23b2d000eabda4796a08625d70
-
SHA1
50f9189d0213b6949e113d948b0f293933f85ba4
-
SHA256
975dc7061e68f49f1076380ab533d07414a4c4de75ce8ba12c769881c5f619c5
-
SHA512
975f178dcce898a13c8eac97c99280ad9e2b2964df04017120b55cc5b705b6a6417109f8a137006912001bde90b53d17630106c40751ae713df7fc08ef50f738
-
SSDEEP
3072:BmMHLYjs2g+ciAlYDyOWIsh0pMf+66C4FxTdCU1byGkGcyXDTEzlDkr/:BrHL+tg+cGyZzheB6b4fJCwb8d0E
Malware Config
Extracted
Family |
dridex |
Botnet |
22201 |
C2 |
195.154.146.84:443 45.56.121.87:8116 157.245.222.44:5723 |
rc4.plain |
|
rc4.plain |
|
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3256-138-0x0000000075740000-0x000000007576F000-memory.dmp dridex_ldr behavioral2/memory/3256-139-0x0000000075740000-0x000000007577E000-memory.dmp dridex_ldr -
Program crash ⋅ 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4592 3256 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory ⋅ 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4652 wrote to memory of 3256 4652 rundll32.exe rundll32.exe PID 4652 wrote to memory of 3256 4652 rundll32.exe rundll32.exe PID 4652 wrote to memory of 3256 4652 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\975dc7061e68f49f1076380ab533d07414a4c4de75ce8ba12c769881c5f619c5.dll,#1Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\975dc7061e68f49f1076380ab533d07414a4c4de75ce8ba12c769881c5f619c5.dll,#1
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 620Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3256 -ip 3256
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
memory/3256-132-0x0000000000000000-mapping.dmp
-
memory/3256-133-0x0000000075740000-0x000000007577E000-memory.dmp
-
memory/3256-137-0x00000000002E0000-0x00000000002E6000-memory.dmp
-
memory/3256-138-0x0000000075740000-0x000000007576F000-memory.dmp
-
memory/3256-139-0x0000000075740000-0x000000007577E000-memory.dmp
-
memory/3256-140-0x00000000007A0000-0x00000000007A6000-memory.dmp