Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 18:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b81382be175d2deb65cc759bcc99aeea.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b81382be175d2deb65cc759bcc99aeea.dll
-
Size
188KB
-
MD5
b81382be175d2deb65cc759bcc99aeea
-
SHA1
254af48fb7adf2a54015834eb5a58cceefd790fa
-
SHA256
799bf60d33c37aa61ae62bf7ac4317970e98f68d07d5dda319f48aeb359bbe2a
-
SHA512
de1326ccfdde3e21cef80d51baddd620763ef3e4e7e4b2a5f65bda7723be9b3e420a1b451061e5201b718ef7b01e8a833b57807dab6d008272380f1c2c530a33
-
SSDEEP
3072:FA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo2o:FzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2012-0-0x00000000754F0000-0x0000000075520000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1280 2012 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2012 2104 rundll32.exe 28 PID 2104 wrote to memory of 2012 2104 rundll32.exe 28 PID 2104 wrote to memory of 2012 2104 rundll32.exe 28 PID 2104 wrote to memory of 2012 2104 rundll32.exe 28 PID 2104 wrote to memory of 2012 2104 rundll32.exe 28 PID 2104 wrote to memory of 2012 2104 rundll32.exe 28 PID 2104 wrote to memory of 2012 2104 rundll32.exe 28 PID 2012 wrote to memory of 1280 2012 rundll32.exe 29 PID 2012 wrote to memory of 1280 2012 rundll32.exe 29 PID 2012 wrote to memory of 1280 2012 rundll32.exe 29 PID 2012 wrote to memory of 1280 2012 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b81382be175d2deb65cc759bcc99aeea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b81382be175d2deb65cc759bcc99aeea.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 3003⤵
- Program crash
PID:1280
-
-