Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 11:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d8b549150f14b0b3a37b7c44aa78ef07.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
d8b549150f14b0b3a37b7c44aa78ef07.dll
-
Size
184KB
-
MD5
d8b549150f14b0b3a37b7c44aa78ef07
-
SHA1
9e5766e3808be3f495a37fba08c40a78b63c4d8c
-
SHA256
54cc02677ead7f7d7d77c372feec70c097dfc6a48ac765d8a97ad642f53592e8
-
SHA512
8c72773b126cbe59b5b32e410d7b3d29eaeb112305cc89b423e81c8c8b8607e685019b1d7f9695ec5368158ba3eef80ae2aaea908be6db9b57b7a2f6e899ed4e
-
SSDEEP
3072:Hhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33J6VQcY:H3fOeIv54W6SFKfc9me9v9/J6V
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4488-0-0x00000000754A0000-0x00000000754D0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4392 4488 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1696 wrote to memory of 4488 1696 rundll32.exe rundll32.exe PID 1696 wrote to memory of 4488 1696 rundll32.exe rundll32.exe PID 1696 wrote to memory of 4488 1696 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8b549150f14b0b3a37b7c44aa78ef07.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8b549150f14b0b3a37b7c44aa78ef07.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 6683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4488 -ip 44881⤵