Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 12:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d8cd2b067de0a6eb898bae0bf25779a2.dll
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
d8cd2b067de0a6eb898bae0bf25779a2.dll
-
Size
188KB
-
MD5
d8cd2b067de0a6eb898bae0bf25779a2
-
SHA1
31445af00e2627c605eed961a816f0cb52dab578
-
SHA256
05914782798f597c1e4fdd982b044e3e69e06c1e153be232cfe8781132b5e730
-
SHA512
5994594490eeebbda2dd567c62ef0df951637c08d8158f6102b4fbd39f45deb93b0fe1e6574ad9a04413a0bed28de9163cb5b209d12600b206bde13794282395
-
SSDEEP
3072:aA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoqo:azIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2508-0-0x0000000074C40000-0x0000000074C70000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1704 wrote to memory of 2508 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2508 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2508 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2508 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2508 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2508 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2508 1704 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8cd2b067de0a6eb898bae0bf25779a2.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8cd2b067de0a6eb898bae0bf25779a2.dll,#12⤵