Analysis
-
max time kernel
161s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2024 08:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
db29303d32dc05481e17d88cb61e69d7.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
db29303d32dc05481e17d88cb61e69d7.dll
-
Size
188KB
-
MD5
db29303d32dc05481e17d88cb61e69d7
-
SHA1
58c826eed9482fad1e3102e7d8e9200364feaf9b
-
SHA256
75e8dd9867f84a8aa74247d98f71b02f0cc385902c8ee0bf0fb42d57ae973d84
-
SHA512
02b0a0dd82d31b85e2884db6a39cd5d20298bd369aa856cd1ee4bbc47893f028a3a0d146d68653752019a15ba8ff6b4849bd15c01720e5eb58cc7eb032a5f135
-
SSDEEP
3072:EA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoCo:EzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3160-0-0x0000000075650000-0x0000000075680000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1568 3160 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2920 wrote to memory of 3160 2920 rundll32.exe rundll32.exe PID 2920 wrote to memory of 3160 2920 rundll32.exe rundll32.exe PID 2920 wrote to memory of 3160 2920 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db29303d32dc05481e17d88cb61e69d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db29303d32dc05481e17d88cb61e69d7.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3160 -ip 31601⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2588,i,14229658658073991926,6938034815163866135,262144 --variations-seed-version /prefetch:81⤵