Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1ec6e655995290d0fc5c03f49212e675.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ec6e655995290d0fc5c03f49212e675.dll
Resource
win10v2004-20231222-en
0 signatures
150 seconds
General
-
Target
1ec6e655995290d0fc5c03f49212e675.dll
-
Size
188KB
-
MD5
1ec6e655995290d0fc5c03f49212e675
-
SHA1
a6531dde3b47e5ab3b9b7c3c30229f2be6533d93
-
SHA256
87dbfe79296c0a7624923678b6b35d466482f0d99831d8353a2897ba846b2438
-
SHA512
4d996307648db12793b2a99a648025644bfff89533c3856f775ebf4b04476616eaea9b6c8060acedc2965f4c8d6e2e34b4ed344db7496029f1d9003b13ce85eb
-
SSDEEP
3072:JA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAolo:JzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2288-0-0x0000000074A30000-0x0000000074A60000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2288 WerFault.exe 18 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2288 2164 rundll32.exe 18 PID 2164 wrote to memory of 2288 2164 rundll32.exe 18 PID 2164 wrote to memory of 2288 2164 rundll32.exe 18 PID 2164 wrote to memory of 2288 2164 rundll32.exe 18 PID 2164 wrote to memory of 2288 2164 rundll32.exe 18 PID 2164 wrote to memory of 2288 2164 rundll32.exe 18 PID 2164 wrote to memory of 2288 2164 rundll32.exe 18 PID 2288 wrote to memory of 2700 2288 rundll32.exe 29 PID 2288 wrote to memory of 2700 2288 rundll32.exe 29 PID 2288 wrote to memory of 2700 2288 rundll32.exe 29 PID 2288 wrote to memory of 2700 2288 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ec6e655995290d0fc5c03f49212e675.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ec6e655995290d0fc5c03f49212e675.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 3083⤵
- Program crash
PID:2700
-
-