Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 14:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
976eddfcd7e6f0856b9ffa6eb956118d.dll
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
976eddfcd7e6f0856b9ffa6eb956118d.dll
-
Size
188KB
-
MD5
976eddfcd7e6f0856b9ffa6eb956118d
-
SHA1
2366e7becc102b98126a8c4b9cf49b191080a26c
-
SHA256
3b32ed976f4ed7ea23eecb86ada1f6085544accfe81a1e110b363edd2d957682
-
SHA512
6d6ac0737efecdcd7c07ee03f0eb9d777609167377831620e2a4613c91e009de4bd8dea267f585dad85411b62ed0cf7acd08edf60727cdf6cda1a50aaa482a94
-
SSDEEP
3072:QA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoHo:QzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/4932-0-0x00000000753D0000-0x0000000075400000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4108 4932 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2044 wrote to memory of 4932 2044 rundll32.exe 84 PID 2044 wrote to memory of 4932 2044 rundll32.exe 84 PID 2044 wrote to memory of 4932 2044 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\976eddfcd7e6f0856b9ffa6eb956118d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\976eddfcd7e6f0856b9ffa6eb956118d.dll,#12⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 6883⤵
- Program crash
PID:4108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4932 -ip 49321⤵PID:3856