Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2024 01:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
aff40c1ef760bb8f581ee1910c4d4f92.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
aff40c1ef760bb8f581ee1910c4d4f92.dll
-
Size
188KB
-
MD5
aff40c1ef760bb8f581ee1910c4d4f92
-
SHA1
2893bc2060822b6901ca208981970dd49ee7bdc0
-
SHA256
0eea4f5f709ad31d927431fc6ae589f074d325c4e7bced70cf32719275901df1
-
SHA512
85c1f39c76dd1bb4b0fff1c5dd9af2b19eccc80b6785cb49bebf9249d957f91fe87167f9b3379cc07fa6e80fc6c5c56c8c05fda7b0b03c704a902d91109c68df
-
SSDEEP
3072:HA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoVo:HzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/5060-0-0x0000000075250000-0x0000000075280000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2632 5060 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3208 wrote to memory of 5060 3208 rundll32.exe 88 PID 3208 wrote to memory of 5060 3208 rundll32.exe 88 PID 3208 wrote to memory of 5060 3208 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aff40c1ef760bb8f581ee1910c4d4f92.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aff40c1ef760bb8f581ee1910c4d4f92.dll,#12⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 6883⤵
- Program crash
PID:2632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5060 -ip 50601⤵PID:2148