Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 04:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c26cabd49b67ec47bca189a3725753c9.dll
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
c26cabd49b67ec47bca189a3725753c9.dll
-
Size
188KB
-
MD5
c26cabd49b67ec47bca189a3725753c9
-
SHA1
3a13f3d8e059acdf7ae658746529aa09a2d2abe0
-
SHA256
315352414e67851586902653e0576ed0e5c6aee85a36a26d249f00d0fce0400d
-
SHA512
e9ae9678f884e1ea71ce6f791da51224c028fec06edc0e7c78dbe913810305fe3e479a3c368817be4ee738b55434575d91f49c186bf629f70806df47236555b5
-
SSDEEP
3072:bA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoqo:bzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/2820-1-0x0000000074D10000-0x0000000074D40000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2284 2820 WerFault.exe 96 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2820 4180 rundll32.exe 96 PID 4180 wrote to memory of 2820 4180 rundll32.exe 96 PID 4180 wrote to memory of 2820 4180 rundll32.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c26cabd49b67ec47bca189a3725753c9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c26cabd49b67ec47bca189a3725753c9.dll,#12⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 6923⤵
- Program crash
PID:2284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2820 -ip 28201⤵PID:1912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1352 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:3240