Analysis
-
max time kernel
139s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
50970f32f71f8e7497cecbb3b051cf6c54606751baf6eaebdffa83d160333453.dll
Resource
win7-20240705-en
General
-
Target
50970f32f71f8e7497cecbb3b051cf6c54606751baf6eaebdffa83d160333453.dll
-
Size
184KB
-
MD5
9e634bae7420eb41e7022c53dab02eab
-
SHA1
a5e6376cabc1c82292067fd5603596a21bf0300c
-
SHA256
50970f32f71f8e7497cecbb3b051cf6c54606751baf6eaebdffa83d160333453
-
SHA512
2bc2af836bb131d7cb5fc73c648efe9701d82d755c2e913f6116d65d15565a7ddd840b04aa8bfae7c188cf0e6a17b10c646abb134b293cb552d822d0aee92721
-
SSDEEP
3072:092qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTlrLA:09NSMOEpQ1Q3ODAr+VF
Malware Config
Extracted
dridex
22203
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3944-1-0x00000000751A0000-0x00000000751CF000-memory.dmp dridex_ldr behavioral2/memory/3944-2-0x00000000751A0000-0x00000000751CF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2968 3944 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 2728 wrote to memory of 3944 2728 rundll32.exe 86 PID 2728 wrote to memory of 3944 2728 rundll32.exe 86 PID 2728 wrote to memory of 3944 2728 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50970f32f71f8e7497cecbb3b051cf6c54606751baf6eaebdffa83d160333453.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50970f32f71f8e7497cecbb3b051cf6c54606751baf6eaebdffa83d160333453.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 6243⤵
- Program crash
PID:2968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3944 -ip 39441⤵PID:3844