Analysis
-
max time kernel
76s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 02:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a160b77d77017cc06f4aab8fcc2fdc20N.dll
Resource
win7-20240704-en
5 signatures
120 seconds
General
-
Target
a160b77d77017cc06f4aab8fcc2fdc20N.dll
-
Size
184KB
-
MD5
a160b77d77017cc06f4aab8fcc2fdc20
-
SHA1
0bdcd9b6fea10563a54154688c83c0796cbe6d1c
-
SHA256
35f42905f801245c1a1a6eaae29fac5a0129c9c0cfd4cd19a0aba5854bd11dcf
-
SHA512
9ac357f2e1115c027bcc833033fa4bf016235b03e74383d5284d5ff28fe05d35850850ef4d47f110b2cfa84ad2817f39f4070dccbd69e2d814693409a77e97fd
-
SSDEEP
3072:QW8WgWhVnmr6k/6zsRJLNqTXvMU9tb+/HU6ngmuWx9ixCH0u:78qh+66QsRdNiBW/06ngmuWexC
Malware Config
Extracted
Family
dridex
Botnet
22203
C2
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/2672-0-0x0000000074DB0000-0x0000000074DE0000-memory.dmp dridex_ldr behavioral2/memory/2672-2-0x0000000074DB0000-0x0000000074DE0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4244 2672 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 856 wrote to memory of 2672 856 rundll32.exe 86 PID 856 wrote to memory of 2672 856 rundll32.exe 86 PID 856 wrote to memory of 2672 856 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a160b77d77017cc06f4aab8fcc2fdc20N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a160b77d77017cc06f4aab8fcc2fdc20N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 6163⤵
- Program crash
PID:4244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2672 -ip 26721⤵PID:2052