Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 19:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b2dedba29f062f380a0d7b10fa5844bf.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
b2dedba29f062f380a0d7b10fa5844bf.dll
-
Size
188KB
-
MD5
b2dedba29f062f380a0d7b10fa5844bf
-
SHA1
3bedbc0dd951f9f9f08c3a8752141b79928766c6
-
SHA256
4f6a46fa934e1ac4be9eaeb67b3d2ac5964d25d4d04893e936d6f6e1f5d3a8c9
-
SHA512
2a36e5542b58c7217238b10c2fa00772c290d6f12de8c124d3318796cee56045ede122dcd78a59bed57f9a0810df4c03de8492bb619c6230a600e9405340eff1
-
SSDEEP
3072:tA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoBo:tzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/2292-0-0x0000000074DA0000-0x0000000074DD0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1464 2292 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2292 3888 rundll32.exe 88 PID 3888 wrote to memory of 2292 3888 rundll32.exe 88 PID 3888 wrote to memory of 2292 3888 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2dedba29f062f380a0d7b10fa5844bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2dedba29f062f380a0d7b10fa5844bf.dll,#12⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 6923⤵
- Program crash
PID:1464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2292 -ip 22921⤵PID:3528