Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 21:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e01f65305610111e65e4474e64f7a4f5.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e01f65305610111e65e4474e64f7a4f5.dll
-
Size
188KB
-
MD5
e01f65305610111e65e4474e64f7a4f5
-
SHA1
b4c65a1d4f38abd7dec7c8bc27cbb8450e66f5fc
-
SHA256
d1323a4231ed5029eb524f9f7cfaba94468590fd96974c7377c1070990102396
-
SHA512
e3987fcb9095e74e714fbd1b2a2b6c92b383d928a0f3171fa54c71640b65d1545764d60dae4d0ff5d08d0192f2bdcfa6bec83c482250641d989ddfe1613bc82b
-
SSDEEP
3072:RA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoso:RzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4036-1-0x00000000758F0000-0x0000000075920000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1844 4036 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4856 wrote to memory of 4036 4856 rundll32.exe rundll32.exe PID 4856 wrote to memory of 4036 4856 rundll32.exe rundll32.exe PID 4856 wrote to memory of 4036 4856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e01f65305610111e65e4474e64f7a4f5.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e01f65305610111e65e4474e64f7a4f5.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 6643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4036 -ip 40361⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2228,i,521073434451423547,2311651514500527526,262144 --variations-seed-version /prefetch:81⤵