Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 09:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
96da130d4ffccc521ad730e254f581b7.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
96da130d4ffccc521ad730e254f581b7.dll
-
Size
188KB
-
MD5
96da130d4ffccc521ad730e254f581b7
-
SHA1
90f3f5f9fa2dbbd271fbcdf1afe075f4d06f82ce
-
SHA256
50757d93fa4cec9c59c6001deaa94c2bcbe6c8a236ee0948b8cc60fd7f7e8cce
-
SHA512
9d84fd4522182dc681e9edf97c43a9ca35444d841f01032998d909ddcebb83b74d0ba04e8bf6944069ee8fef96bfe50713c0e33b6e88887ec3a79b599ccce1fe
-
SSDEEP
3072:0A8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoWo:0zIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/624-0-0x0000000074EB0000-0x0000000074EE0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2616 624 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2420 wrote to memory of 624 2420 rundll32.exe 28 PID 2420 wrote to memory of 624 2420 rundll32.exe 28 PID 2420 wrote to memory of 624 2420 rundll32.exe 28 PID 2420 wrote to memory of 624 2420 rundll32.exe 28 PID 2420 wrote to memory of 624 2420 rundll32.exe 28 PID 2420 wrote to memory of 624 2420 rundll32.exe 28 PID 2420 wrote to memory of 624 2420 rundll32.exe 28 PID 624 wrote to memory of 2616 624 rundll32.exe 29 PID 624 wrote to memory of 2616 624 rundll32.exe 29 PID 624 wrote to memory of 2616 624 rundll32.exe 29 PID 624 wrote to memory of 2616 624 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96da130d4ffccc521ad730e254f581b7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96da130d4ffccc521ad730e254f581b7.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 3003⤵
- Program crash
PID:2616
-
-