Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 14:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
df6e7a558c69958a0d09ff613d3794fc.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
df6e7a558c69958a0d09ff613d3794fc.dll
-
Size
184KB
-
MD5
df6e7a558c69958a0d09ff613d3794fc
-
SHA1
113bc55303d4a334cfe311e365487f1976c4ffd2
-
SHA256
7cdc32bdf8afff4b354a150f300549f3b2cbbc8bc6a8d142e94aa25de2677d0f
-
SHA512
d0ac8875593058b0278c7a2502e0ac05f560de185562034fcf735ecd7c5349975ec2085a0be4b3321738e95bf75ab625c9b429f47d5eef2bbbe5177bbed05ae4
-
SSDEEP
3072:Dhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33J7VQcY:D3fOeIv54W6SFKfc9me9v9/J7V
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2176-0-0x0000000075330000-0x0000000075360000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2260 2176 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2176 1948 rundll32.exe 28 PID 1948 wrote to memory of 2176 1948 rundll32.exe 28 PID 1948 wrote to memory of 2176 1948 rundll32.exe 28 PID 1948 wrote to memory of 2176 1948 rundll32.exe 28 PID 1948 wrote to memory of 2176 1948 rundll32.exe 28 PID 1948 wrote to memory of 2176 1948 rundll32.exe 28 PID 1948 wrote to memory of 2176 1948 rundll32.exe 28 PID 2176 wrote to memory of 2260 2176 rundll32.exe 29 PID 2176 wrote to memory of 2260 2176 rundll32.exe 29 PID 2176 wrote to memory of 2260 2176 rundll32.exe 29 PID 2176 wrote to memory of 2260 2176 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df6e7a558c69958a0d09ff613d3794fc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df6e7a558c69958a0d09ff613d3794fc.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2883⤵
- Program crash
PID:2260
-
-