Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 03:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d26b7d1cfe266ee11a35030cc47cc4c0N.dll
Resource
win7-20240708-en
windows7-x64
5 signatures
120 seconds
General
-
Target
d26b7d1cfe266ee11a35030cc47cc4c0N.dll
-
Size
184KB
-
MD5
d26b7d1cfe266ee11a35030cc47cc4c0
-
SHA1
731c287d8940edea8a32c021473f0f99adb9546f
-
SHA256
29d931229ca1096e2ef16adc3b6987696c8fad472be637edba2e8e4b51d84276
-
SHA512
96291caebd7df3055928c377313cc153ef297b096d8f8ca0044b4e4883817c2ad720d00d19886244796b1c79558e84c4260d2d5a006ca0cd5008c0684e1b9ef1
-
SSDEEP
3072:O92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTfrLA:O9NSMOEpQ1Q3ODAr+V3
Malware Config
Extracted
Family
dridex
Botnet
22203
C2
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/4852-1-0x0000000075600000-0x000000007562F000-memory.dmp dridex_ldr behavioral2/memory/4852-2-0x0000000075600000-0x000000007562F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 3292 4852 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4852 4848 rundll32.exe 84 PID 4848 wrote to memory of 4852 4848 rundll32.exe 84 PID 4848 wrote to memory of 4852 4848 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26b7d1cfe266ee11a35030cc47cc4c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26b7d1cfe266ee11a35030cc47cc4c0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 6163⤵
- Program crash
PID:3292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4852 -ip 48521⤵PID:1032