Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 12:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e1b12647f4e807bfe033d483a6a15d7b.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
e1b12647f4e807bfe033d483a6a15d7b.dll
-
Size
188KB
-
MD5
e1b12647f4e807bfe033d483a6a15d7b
-
SHA1
b37cdd70a58d7ac27b046feb63f01a715dee0661
-
SHA256
5e230e23256c560fca20da7f661c40b6d54223f0ff71186f2849a1310aa27d3a
-
SHA512
b1ff03565719ae98a028e75aa9bf5ea4cd265e356d5d85bfae7aa6d81ed56cd4895148707bc5ba7b5854ff98187564a1a81855460a35e91e014c5fc741745655
-
SSDEEP
3072:mA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAoCo:mzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.82.248.59:443
54.39.98.141:6602
103.109.247.8:10443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2156-0-0x0000000075210000-0x0000000075240000-memory.dmp dridex_ldr behavioral1/memory/2156-2-0x0000000075210000-0x0000000075240000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2044 2156 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2156 2952 rundll32.exe 28 PID 2952 wrote to memory of 2156 2952 rundll32.exe 28 PID 2952 wrote to memory of 2156 2952 rundll32.exe 28 PID 2952 wrote to memory of 2156 2952 rundll32.exe 28 PID 2952 wrote to memory of 2156 2952 rundll32.exe 28 PID 2952 wrote to memory of 2156 2952 rundll32.exe 28 PID 2952 wrote to memory of 2156 2952 rundll32.exe 28 PID 2156 wrote to memory of 2044 2156 rundll32.exe 29 PID 2156 wrote to memory of 2044 2156 rundll32.exe 29 PID 2156 wrote to memory of 2044 2156 rundll32.exe 29 PID 2156 wrote to memory of 2044 2156 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1b12647f4e807bfe033d483a6a15d7b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1b12647f4e807bfe033d483a6a15d7b.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 3003⤵
- Program crash
PID:2044
-
-