Analysis
-
max time kernel
128s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 20:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3dc15b5b1ea42db38b01aa3057deade1.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
3dc15b5b1ea42db38b01aa3057deade1.dll
-
Size
188KB
-
MD5
3dc15b5b1ea42db38b01aa3057deade1
-
SHA1
8f047f1e6219adec0c347bf841ef2dc18babed0d
-
SHA256
967b84ced9b96ac6cc28a29f3651d9c6bf38b9b4bf94fa6d2002709e8fd41ce4
-
SHA512
8ebb462807171c7e273e7ddeae40e3bafc0b72fa8e121532d9f323a23cdcb53712f5d15b4d6a1cfb7dd1bdc307cfcb7dffe39b84540c93358279a7de7cd6bf0a
-
SSDEEP
3072:eA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoXo:ezIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/2892-1-0x0000000074AD0000-0x0000000074B00000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4696 2892 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2892 4736 rundll32.exe 89 PID 4736 wrote to memory of 2892 4736 rundll32.exe 89 PID 4736 wrote to memory of 2892 4736 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc15b5b1ea42db38b01aa3057deade1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc15b5b1ea42db38b01aa3057deade1.dll,#12⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 6923⤵
- Program crash
PID:4696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2892 -ip 28921⤵PID:1144