Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 00:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
478399e53e2b851666230170a183b837.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
478399e53e2b851666230170a183b837.dll
-
Size
188KB
-
MD5
478399e53e2b851666230170a183b837
-
SHA1
d416dfe027f4644ac56b7584ff83fbe9b5ba1bc0
-
SHA256
fc6d97dadb132342b5b5c5e2fe9d0320dfac341ea67eaf3c1a9987d02751ba27
-
SHA512
6e209260b21a7269d0d028843cc79a355c023b74f29f6516330770d42eff5cbe9318621be4f969734e16e24d73ab255cc767fab49d4fc26b37719e82d9068793
-
SSDEEP
3072:qA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAomo:qzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/4920-0-0x0000000074E70000-0x0000000074EA0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1716 4920 WerFault.exe 16 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1240 wrote to memory of 4920 1240 rundll32.exe 16 PID 1240 wrote to memory of 4920 1240 rundll32.exe 16 PID 1240 wrote to memory of 4920 1240 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\478399e53e2b851666230170a183b837.dll,#11⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 6962⤵
- Program crash
PID:1716
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\478399e53e2b851666230170a183b837.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4920 -ip 49201⤵PID:3488