Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 01:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
57997457450235375dfa2880863c0ed7.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
57997457450235375dfa2880863c0ed7.dll
-
Size
188KB
-
MD5
57997457450235375dfa2880863c0ed7
-
SHA1
0bc404d6b52b15e506788677b0ab63d18653a97d
-
SHA256
6cb1af59fd679f769be458828ed1ac42301d00cc80bb3a3b1f0fb8033c0df3bf
-
SHA512
fd752e6fe6f6e62707818cc6099b03dfb991d78c3ab93bd205a99ada69d4eccd90bd612dc01d810acca9b6fda8fe6fbbe0f1296a6929a3d6d71b4617ef14c2e8
-
SSDEEP
3072:eA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoSo:ezIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2188-0-0x0000000074A70000-0x0000000074AA0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2692 2188 WerFault.exe 18 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 808 wrote to memory of 2188 808 rundll32.exe 18 PID 808 wrote to memory of 2188 808 rundll32.exe 18 PID 808 wrote to memory of 2188 808 rundll32.exe 18 PID 808 wrote to memory of 2188 808 rundll32.exe 18 PID 808 wrote to memory of 2188 808 rundll32.exe 18 PID 808 wrote to memory of 2188 808 rundll32.exe 18 PID 808 wrote to memory of 2188 808 rundll32.exe 18 PID 2188 wrote to memory of 2692 2188 rundll32.exe 29 PID 2188 wrote to memory of 2692 2188 rundll32.exe 29 PID 2188 wrote to memory of 2692 2188 rundll32.exe 29 PID 2188 wrote to memory of 2692 2188 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57997457450235375dfa2880863c0ed7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57997457450235375dfa2880863c0ed7.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 3083⤵
- Program crash
PID:2692
-
-