Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 07:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7f490bf83ce3f2d56645d74c1b26b6b0.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7f490bf83ce3f2d56645d74c1b26b6b0.dll
-
Size
184KB
-
MD5
7f490bf83ce3f2d56645d74c1b26b6b0
-
SHA1
5f1a2e6645aba66fd1141092aaa1556e475aaf57
-
SHA256
a03e9f1b88334a7562d6546d9716815767d14cf4ff7a1fcf194b54a00ed8f729
-
SHA512
6005d6ded063c5669e310c46b85e22cdc6a5d1aedeb4f6c11ec0328c5479648303651ab5b974b23301d5d6f3af84d782ebec382d156766d38a9c86b97dc9d9b0
-
SSDEEP
3072:Bhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JGVQcY:B3fOeIv54W6SFKfc9me9v9/JGV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/1932-0-0x00000000749C0000-0x00000000749F0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 996 1932 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1932 1628 rundll32.exe 83 PID 1628 wrote to memory of 1932 1628 rundll32.exe 83 PID 1628 wrote to memory of 1932 1628 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f490bf83ce3f2d56645d74c1b26b6b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f490bf83ce3f2d56645d74c1b26b6b0.dll,#12⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 6683⤵
- Program crash
PID:996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1932 -ip 19321⤵PID:4964