Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 18:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d98fc00884b11f9553621eba3d9234e4.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
d98fc00884b11f9553621eba3d9234e4.dll
-
Size
188KB
-
MD5
d98fc00884b11f9553621eba3d9234e4
-
SHA1
02959ebdaa899ca55d7f77385334590d5c59e11c
-
SHA256
39a2a6343162d19850e982098b11b2ae31a32285b8091169a011f8cb911c2852
-
SHA512
e3149e49d71832b7cb4583cf7656ac9aa8bc7545b9064a1a5ee3874145b0cea101fe9a721bcb8cefda53b90c4dd857d5b51163431ff62efee48e04c376e7d1e4
-
SSDEEP
3072:SA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoro:SzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4692-0-0x00000000758D0000-0x0000000075900000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4288 4692 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4624 wrote to memory of 4692 4624 rundll32.exe rundll32.exe PID 4624 wrote to memory of 4692 4624 rundll32.exe rundll32.exe PID 4624 wrote to memory of 4692 4624 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d98fc00884b11f9553621eba3d9234e4.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d98fc00884b11f9553621eba3d9234e4.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4692 -ip 46921⤵