Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 07:58
Static task
static1
1 signatures
General
-
Target
16017353e67868fd3b785aa22db51efb.dll
-
Size
168KB
-
MD5
16017353e67868fd3b785aa22db51efb
-
SHA1
c85f9fca75fab04d74bbece3c180f318d55581dd
-
SHA256
0c262ad9b5f041419149ee032e82abe2f7d06d263de648214c2a484436587d9a
-
SHA512
ac6e5395d17aa97fd0fd2b7748c7525b139a339b9f86e14a714bc57d193af4c825c0584a446830a3fb51d68687be6f193412bab7d3c86efc5e32836454a56586
-
SSDEEP
3072:p+rGFFRCMcyzAAykMPqIaXpZYnvf3gx4wblxLSoIm/H2QKGB2gC:p+rGFFlXAAcqj8nHgfOoIdG
Malware Config
Extracted
Family
dridex
Botnet
111
C2
173.203.78.138:443
217.160.107.189:6601
77.220.64.150:5037
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/1844-0-0x0000000074F40000-0x0000000074F6C000-memory.dmp dridex_ldr behavioral1/memory/1844-3-0x0000000074F40000-0x0000000074F6C000-memory.dmp dridex_ldr behavioral1/memory/1844-5-0x0000000074F40000-0x0000000074F6C000-memory.dmp dridex_ldr -
Blocklisted process makes network request 1 IoCs
flow pid Process 14 1844 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3388 wrote to memory of 1844 3388 rundll32.exe 84 PID 3388 wrote to memory of 1844 3388 rundll32.exe 84 PID 3388 wrote to memory of 1844 3388 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16017353e67868fd3b785aa22db51efb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16017353e67868fd3b785aa22db51efb.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1844
-