Analysis
-
max time kernel
104s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
327074efb47343ad7570ca2ac5a4ca50N.dll
Resource
win7-20240729-en
General
-
Target
327074efb47343ad7570ca2ac5a4ca50N.dll
-
Size
184KB
-
MD5
327074efb47343ad7570ca2ac5a4ca50
-
SHA1
a3aecdec672dab53420b709b0b3513e9008d12f1
-
SHA256
f7951e7902d40db690203a808c2f1da49a9e9b44dbf68d38f420b9781811dd4c
-
SHA512
d018fe50268fea896fc75e6df35a60f7c445f379f9c6f8bc40709f51c65c6dd94c117f939dc1e823b56bf397476309bfa4944cb4132b7a021b0a06ac82df8db2
-
SSDEEP
3072:7iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoYlzoxss7:7iLVCIT4WK2z1W+CUHZj4Skq/eaoGoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
resource yara_rule behavioral2/memory/4464-0-0x0000000075380000-0x00000000753AF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 932 4464 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4140 wrote to memory of 4464 4140 rundll32.exe 84 PID 4140 wrote to memory of 4464 4140 rundll32.exe 84 PID 4140 wrote to memory of 4464 4140 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\327074efb47343ad7570ca2ac5a4ca50N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\327074efb47343ad7570ca2ac5a4ca50N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 6163⤵
- Program crash
PID:932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4464 -ip 44641⤵PID:3008