Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 20:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b9b331fa02aed54a71d89214d1b09c8.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
1b9b331fa02aed54a71d89214d1b09c8.dll
-
Size
184KB
-
MD5
1b9b331fa02aed54a71d89214d1b09c8
-
SHA1
77d8eada64b2063770ad0938ad05c3e25d114d89
-
SHA256
0e579140dd5d8af659102f20ef68a96385e573548ebc3a286236451d5deb02e8
-
SHA512
77a60b89fc17fde44a8a94254d73ce7bb1c2b71c93b9ea7d18c35cd2a6c84dcc7e6f2a6a2cc3eff126171f7a71824c2e9a24c99f358ceb0d378fd2d6b3e97ab4
-
SSDEEP
3072:Uhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JtVQcY:U3fOeIv54W6SFKfc9me9v9/JtV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/3180-0-0x0000000074B10000-0x0000000074B40000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2196 3180 WerFault.exe 14 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3180 1756 rundll32.exe 14 PID 1756 wrote to memory of 3180 1756 rundll32.exe 14 PID 1756 wrote to memory of 3180 1756 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b9b331fa02aed54a71d89214d1b09c8.dll,#11⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 6682⤵
- Program crash
PID:2196
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b9b331fa02aed54a71d89214d1b09c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3180 -ip 31801⤵PID:3004