Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 00:45 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7e6ebc783b09d01889328a110d4629b7.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
7e6ebc783b09d01889328a110d4629b7.dll
-
Size
184KB
-
MD5
7e6ebc783b09d01889328a110d4629b7
-
SHA1
8838adcae0660bab5161c0099a10a52be633a727
-
SHA256
30b9a7a19b63a3334d82064a4e556ab142cf76761cc5a6c4586ca76ee968686b
-
SHA512
dd457adcafe70b03ad2d0366887bec65a1baef28d655a130422f2624dd6a3eeaa188b3dcd25710847f49df62cc091887d1001364320624305e5936091217fff4
-
SSDEEP
3072:Qhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JMVQcY:Q3fOeIv54W6SFKfc9me9v9/JMV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
1
WRYzqbQrq4nxxvj0o3nPxGww5RvBJIgf7A4UrXB6RRGsbLnk
rc4.plain
1
DMVQuKp5CkVnEDbHfkyipjbrrpJttVeOeLMjAJnTLL4we7IZvq7WsL2kmv
Signatures
-
resource yara_rule behavioral2/memory/2700-0-0x0000000074CB0000-0x0000000074CE0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3140 2700 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2700 4032 rundll32.exe 85 PID 4032 wrote to memory of 2700 4032 rundll32.exe 85 PID 4032 wrote to memory of 2700 4032 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e6ebc783b09d01889328a110d4629b7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e6ebc783b09d01889328a110d4629b7.dll,#12⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 6683⤵
- Program crash
PID:3140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2700 -ip 27001⤵PID:2228
Network
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.173.189.20.in-addr.arpaIN PTRResponse
No results found
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
20.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
15.173.189.20.in-addr.arpa