Analysis
-
max time kernel
143s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 17:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ac713d5e4ba95e42cad27b6def936c4d.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
ac713d5e4ba95e42cad27b6def936c4d.dll
-
Size
188KB
-
MD5
ac713d5e4ba95e42cad27b6def936c4d
-
SHA1
5cbf978020b41575dc80e5c9a1cc14e665056888
-
SHA256
4d4eee6e8db3357dcefe1db6071639375c2b04bed9458575a06a60d95f64c162
-
SHA512
da5b3eaff8a35e0774989587c9c3c0539e1673e8bc2ed8ce20982a4c4cb8db85f01c73954d4d03f5c1c78ac6c30aecd6860e7d242ec6ad9db4451faa2cf3263f
-
SSDEEP
3072:iA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAovo:izIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/3176-0-0x0000000074F30000-0x0000000074F60000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1700 3176 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3176 4812 rundll32.exe 87 PID 4812 wrote to memory of 3176 4812 rundll32.exe 87 PID 4812 wrote to memory of 3176 4812 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac713d5e4ba95e42cad27b6def936c4d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac713d5e4ba95e42cad27b6def936c4d.dll,#12⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 6923⤵
- Program crash
PID:1700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3176 -ip 31761⤵PID:4068