Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 18:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8179bc64652d44d11b75f64430faa3bf9ebb6a4086af14ee4018b8bf36e685a3.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
8179bc64652d44d11b75f64430faa3bf9ebb6a4086af14ee4018b8bf36e685a3.dll
-
Size
468KB
-
MD5
7cd23d8209f040ad6536ac558fa7ae89
-
SHA1
07f2bf5697e9b248d8976a0ffd238674a43380bd
-
SHA256
8179bc64652d44d11b75f64430faa3bf9ebb6a4086af14ee4018b8bf36e685a3
-
SHA512
7157ad3aea43054e148531b6cbd2a0f01c68aa85958be8105d8e1a2452d296a7429ccb037efc88d8a55bac92d6d8c87bda5331e0e921406a6399046fc771e61a
-
SSDEEP
6144:n0610FnNqVnt0Rt1CVlp0R5aMSw8EekUXnAwd37izAQqK/o2B6LjiReYiL3EU:06MSw8EekuB37izvjI/gU
Malware Config
Extracted
Family
dridex
Botnet
22206
C2
120.50.40.185:443
139.59.14.223:8172
121.40.104.209:6602
139.162.113.169:593
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/5008-1-0x0000000075670000-0x00000000756E6000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4268 5008 WerFault.exe 55 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1060 wrote to memory of 5008 1060 rundll32.exe 55 PID 1060 wrote to memory of 5008 1060 rundll32.exe 55 PID 1060 wrote to memory of 5008 1060 rundll32.exe 55
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8179bc64652d44d11b75f64430faa3bf9ebb6a4086af14ee4018b8bf36e685a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8179bc64652d44d11b75f64430faa3bf9ebb6a4086af14ee4018b8bf36e685a3.dll,#12⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 6443⤵
- Program crash
PID:4268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5008 -ip 50081⤵PID:2740