Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2024 04:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b05900afd64c21e09b66a2c1a664e85e.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
b05900afd64c21e09b66a2c1a664e85e.dll
-
Size
188KB
-
MD5
b05900afd64c21e09b66a2c1a664e85e
-
SHA1
76883ec13774398bc08fdced3c3ee2b5fabe75a1
-
SHA256
e5e8ab3d1b4d8d5c95f5f35e140765d3e55c9523ba2fb8249a93075c99c64ab2
-
SHA512
ec901ec9d68ffdd1431cf8f79b3075652400cfdb5fa3116dbfb70419ed31fe24d976ce5dee4efd2cf4d99d929dce948b7bc6e012b34cfa335553a0033bc367a2
-
SSDEEP
3072:zA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo5o:zzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/4580-0-0x0000000075760000-0x0000000075790000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2232 4580 WerFault.exe 94 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4580 4772 rundll32.exe 94 PID 4772 wrote to memory of 4580 4772 rundll32.exe 94 PID 4772 wrote to memory of 4580 4772 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b05900afd64c21e09b66a2c1a664e85e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b05900afd64c21e09b66a2c1a664e85e.dll,#12⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 6883⤵
- Program crash
PID:2232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4580 -ip 45801⤵PID:2860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=3084,i,14217130992253490921,11543335378077656547,262144 --variations-seed-version /prefetch:81⤵PID:2284