Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2024 04:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b04c2849b793fd93dfef1993de2e00cb.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
b04c2849b793fd93dfef1993de2e00cb.dll
-
Size
188KB
-
MD5
b04c2849b793fd93dfef1993de2e00cb
-
SHA1
55ee55166b48f3f4cb82b27095d2a75c3bb240f4
-
SHA256
784dc7b0396e746a21a9e2200df52f469eadb04063c758585af120faba21a590
-
SHA512
d0f001f9b68a75b9b385463a3c6f6d7f743ef1db5ce2a487da947a585b25435dffd830d07a3c2f280f2f0ef99094b5a6394f182e21077e088e6b29a292a5a9f6
-
SSDEEP
3072:tA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoXo:tzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/4216-0-0x00000000756D0000-0x0000000075700000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4384 4216 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4216 2872 rundll32.exe 87 PID 2872 wrote to memory of 4216 2872 rundll32.exe 87 PID 2872 wrote to memory of 4216 2872 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b04c2849b793fd93dfef1993de2e00cb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b04c2849b793fd93dfef1993de2e00cb.dll,#12⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 6923⤵
- Program crash
PID:4384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4216 -ip 42161⤵PID:4632