Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 04:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
62d5366bd86aa86d5654aee2441c2ba9.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
62d5366bd86aa86d5654aee2441c2ba9.dll
-
Size
184KB
-
MD5
62d5366bd86aa86d5654aee2441c2ba9
-
SHA1
9b7174957ae2a4e35ec69b7167ae748d2c425dc0
-
SHA256
5b3ddce2ae28eb5df308637ee12f86c406f0545ac52bfe0d89970364e713c294
-
SHA512
d214f21f963649fb53d8cbffee17496e4cedb0312c81093738470bbee11badc1876ae74f9871b44f2bec1f3e2600fbf0c11c46e6369c4cba94f3e5e842dbec04
-
SSDEEP
3072:XgkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdgHdA4l:SPFkq6zOe5ilSanOMd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/4104-0-0x0000000074C70000-0x0000000074CA0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3312 4104 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4104 2596 rundll32.exe 86 PID 2596 wrote to memory of 4104 2596 rundll32.exe 86 PID 2596 wrote to memory of 4104 2596 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62d5366bd86aa86d5654aee2441c2ba9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62d5366bd86aa86d5654aee2441c2ba9.dll,#12⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 6163⤵
- Program crash
PID:3312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4104 -ip 41041⤵PID:1668