Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 15:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e20bd78da4e94366126269c932de9657.dll
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e20bd78da4e94366126269c932de9657.dll
-
Size
184KB
-
MD5
e20bd78da4e94366126269c932de9657
-
SHA1
11a56337605e2bb55c6eb742048a96b5e9ba7258
-
SHA256
fbbbb137be7af7f257c113a996f5d75293006cde041eb80c6fe14002266f473e
-
SHA512
7b03c5484d31a9cc7409b3dcc2d0148b6316759eb638ba1c454b204f2140d520a72c49dde5d715007281362ff6b57932ec5f5f20cf37bdeaedc4a1847f3b20a3
-
SSDEEP
3072:mhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JGVQcY:m3fOeIv54W6SFKfc9me9v9/JGV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/3504-0-0x00000000752A0000-0x00000000752D0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 5064 3504 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 3504 396 rundll32.exe 85 PID 396 wrote to memory of 3504 396 rundll32.exe 85 PID 396 wrote to memory of 3504 396 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e20bd78da4e94366126269c932de9657.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e20bd78da4e94366126269c932de9657.dll,#12⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 6683⤵
- Program crash
PID:5064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3504 -ip 35041⤵PID:3708