Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 17:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cf8oprb5.jpg.dll
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
cf8oprb5.jpg.dll
-
Size
664KB
-
MD5
e336f542343e0c325f97335b6cd911a5
-
SHA1
17efa4877db6fb939f28e04315b4701a087502f1
-
SHA256
27f14a0d6503fbc9ec406c167f9b9b5983e2e6662dc2010e00db49b133afeb89
-
SHA512
15acd921ca6d6f4c73bed213b858e83dbd2159c59e59d94600a01cb25898b9edec5dbf1634f05431418d9fb8257035a1368868c8c890a5dcf5b78d84aeebb89f
-
SSDEEP
12288:u/0Qzqf0eri48EM+6TFKywVt6PbEYU0eyJTT/Mu9oV01uSoaEP:00zhrHn6TFKywvCbEOxDMu9oyyaEP
Malware Config
Extracted
Family
dridex
Botnet
10222
C2
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 31 388 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2636 wrote to memory of 388 2636 rundll32.exe rundll32.exe PID 2636 wrote to memory of 388 2636 rundll32.exe rundll32.exe PID 2636 wrote to memory of 388 2636 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf8oprb5.jpg.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf8oprb5.jpg.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:388
-