Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 17:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
xeamfe0p7.jpg.dll
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
xeamfe0p7.jpg.dll
-
Size
664KB
-
MD5
6f4d3fe1df77dea5ecca8eb2f98e4479
-
SHA1
df265d1b432f1cd6e41ddd55661711abc3032fd3
-
SHA256
5a88d1900129852526c896bec4055db283372e80c9fed1906bf8ced25729e86a
-
SHA512
9cd209d038299ca5b1c24d2a7d04b7057caa87f593fc8b369e8a51e45f23a9aefbfbe42922fa3e7a0d853869ccbe09f326a40dee262e05b645a20299ed771877
-
SSDEEP
12288:B/0Qzqf0eWi48uM+6TFKywVt6PbEYU0eyJTT/Mu9oV01uYoaEP:B0zhWhn6TFKywvCbEOxDMu9oyMaEP
Malware Config
Extracted
Family
dridex
Botnet
10222
C2
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 2900 rundll32.exe 5 2900 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2888 wrote to memory of 2900 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2900 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2900 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2900 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2900 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2900 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2900 2888 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\xeamfe0p7.jpg.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\xeamfe0p7.jpg.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:2900
-