Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/03/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
cf44d002356277038c8b9ddf6d5be037b25c34fb5e1cd94750bcaeddb103db85.dll
Resource
win10v2004-20240226-en
General
-
Target
cf44d002356277038c8b9ddf6d5be037b25c34fb5e1cd94750bcaeddb103db85.dll
-
Size
682KB
-
MD5
695d74f98a3530f57efeba7f59f42c70
-
SHA1
d240ad10acf8f15e8ac29fa8bee58796900bc55a
-
SHA256
cf44d002356277038c8b9ddf6d5be037b25c34fb5e1cd94750bcaeddb103db85
-
SHA512
f63280e43b7fb3d048fd1da4d302f57ed0a218dcbedec5e8b188434ff86b78a20bba972e7d9a2b4d981cf1a13433535c976fc3e538c7c5953c568bef718e0b9b
-
SSDEEP
12288:Gg955yNDTvo88g1iPJHUwMqxoL+0z93kFcochkZ1pFzHOU/GGzKe:n9zGTvBbiPJ0w3o7z93kB8AH6i
Malware Config
Extracted
dridex
10444
77.220.64.37:443
51.15.176.55:3389
85.25.144.36:4643
139.162.53.147:4443
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 4692 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2044 wrote to memory of 4692 2044 rundll32.exe 80 PID 2044 wrote to memory of 4692 2044 rundll32.exe 80 PID 2044 wrote to memory of 4692 2044 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf44d002356277038c8b9ddf6d5be037b25c34fb5e1cd94750bcaeddb103db85.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf44d002356277038c8b9ddf6d5be037b25c34fb5e1cd94750bcaeddb103db85.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:4692
-