Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 16:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
de74a32cedb42b6ee5bf103012327282.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
de74a32cedb42b6ee5bf103012327282.dll
-
Size
188KB
-
MD5
de74a32cedb42b6ee5bf103012327282
-
SHA1
2a5db082bc334905a553c7115593cf6f59520ba6
-
SHA256
c6427e44b96fdbaf9a0d42bf6fbd6e8d248a01322a6a81a199d5f547b82d78af
-
SHA512
ed08c7f6e3fa8bcfca8a9e3ef61c2d5ef2a83d9c394bd50e9bbb60c069b593483538d242012d15728acd7a10ce21eb6c5422de6fdec2fc590c0940b3e1f46a4d
-
SSDEEP
3072:nA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo6o:nzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1796-0-0x0000000074FD0000-0x0000000075000000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1928 1796 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4040 wrote to memory of 1796 4040 rundll32.exe rundll32.exe PID 4040 wrote to memory of 1796 4040 rundll32.exe rundll32.exe PID 4040 wrote to memory of 1796 4040 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de74a32cedb42b6ee5bf103012327282.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de74a32cedb42b6ee5bf103012327282.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 6923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1796 -ip 17961⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4436 --field-trial-handle=2808,i,4621512294509789388,1545966267740426092,262144 --variations-seed-version /prefetch:81⤵