Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c5bb8b12a65098b81b0bfa93b32739f.dll
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3c5bb8b12a65098b81b0bfa93b32739f.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
3c5bb8b12a65098b81b0bfa93b32739f.dll
-
Size
188KB
-
MD5
3c5bb8b12a65098b81b0bfa93b32739f
-
SHA1
ea6784b62ff77fe1b63ea7c3e770d4d1b82cbac2
-
SHA256
9a6b8921a9d015f0d9d5787b6c5deea2aaec7102a2069ea1b31698da91bb5c49
-
SHA512
ee95d8d988fb6e166fe32aa029f98df17aa6f33b8a13894502a0baa267943a9a4d10ffb8ff30dc45bcd5d8d364649a6fe9105fc28a6edb82e9fbf360d41d68c9
-
SSDEEP
3072:UA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo/o:UzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2152-0-0x0000000074FE0000-0x0000000075010000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2144 2152 WerFault.exe 16 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2152 2196 rundll32.exe 16 PID 2196 wrote to memory of 2152 2196 rundll32.exe 16 PID 2196 wrote to memory of 2152 2196 rundll32.exe 16 PID 2196 wrote to memory of 2152 2196 rundll32.exe 16 PID 2196 wrote to memory of 2152 2196 rundll32.exe 16 PID 2196 wrote to memory of 2152 2196 rundll32.exe 16 PID 2196 wrote to memory of 2152 2196 rundll32.exe 16 PID 2152 wrote to memory of 2144 2152 rundll32.exe 29 PID 2152 wrote to memory of 2144 2152 rundll32.exe 29 PID 2152 wrote to memory of 2144 2152 rundll32.exe 29 PID 2152 wrote to memory of 2144 2152 rundll32.exe 29
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c5bb8b12a65098b81b0bfa93b32739f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 3002⤵
- Program crash
PID:2144
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c5bb8b12a65098b81b0bfa93b32739f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196