Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 02:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d4ff6343aa384c20a4828eabc0a953d6.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
d4ff6343aa384c20a4828eabc0a953d6.dll
-
Size
188KB
-
MD5
d4ff6343aa384c20a4828eabc0a953d6
-
SHA1
fac9de481f8b8ab34cc2f69945e090f057cb754f
-
SHA256
deaa562aa43d7113eca9dd27c553aa95107abc9c22315498effda7e277bf4ec0
-
SHA512
1b2a17c9e1fc3c0b5af271792437db0225a59f1405ce69569924720d1838d34c940b5bee5ec71cdb5f4b123768a03b4e487063f402ba887746e7e017ca6222f1
-
SSDEEP
3072:nA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoKo:nzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/552-0-0x0000000074C50000-0x0000000074C80000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3060 552 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2944 wrote to memory of 552 2944 rundll32.exe 28 PID 2944 wrote to memory of 552 2944 rundll32.exe 28 PID 2944 wrote to memory of 552 2944 rundll32.exe 28 PID 2944 wrote to memory of 552 2944 rundll32.exe 28 PID 2944 wrote to memory of 552 2944 rundll32.exe 28 PID 2944 wrote to memory of 552 2944 rundll32.exe 28 PID 2944 wrote to memory of 552 2944 rundll32.exe 28 PID 552 wrote to memory of 3060 552 rundll32.exe 29 PID 552 wrote to memory of 3060 552 rundll32.exe 29 PID 552 wrote to memory of 3060 552 rundll32.exe 29 PID 552 wrote to memory of 3060 552 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4ff6343aa384c20a4828eabc0a953d6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4ff6343aa384c20a4828eabc0a953d6.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 3003⤵
- Program crash
PID:3060
-
-