Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 20:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b30060685134ce36eb1a91ae40995375.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
b30060685134ce36eb1a91ae40995375.dll
-
Size
184KB
-
MD5
b30060685134ce36eb1a91ae40995375
-
SHA1
8a1cf6336a6faa5efc77e6b8d31795d62f33525a
-
SHA256
ebdec74d254707dc5e0a6e0910f8a2764128dce859900853e414b0223198efcd
-
SHA512
cbb82c2b20d713d1ce529af4a2ecb7c17f743320d2da21414592bf6f83ee3e0805128a4702259bf03018dd7ee2bf19c0076a863627635133406b3eb584b95c54
-
SSDEEP
3072:Nhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JFVQcY:N3fOeIv54W6SFKfc9me9v9/JFV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/2908-0-0x0000000075730000-0x0000000075760000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4068 2908 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 2908 1168 rundll32.exe 92 PID 1168 wrote to memory of 2908 1168 rundll32.exe 92 PID 1168 wrote to memory of 2908 1168 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b30060685134ce36eb1a91ae40995375.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b30060685134ce36eb1a91ae40995375.dll,#12⤵PID:2908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 6683⤵
- Program crash
PID:4068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2908 -ip 29081⤵PID:3200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:4276