Analysis
-
max time kernel
101s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 04:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ab458c1895bfc915d8fe8b71bb670140N.dll
Resource
win7-20240704-en
windows7-x64
5 signatures
120 seconds
General
-
Target
ab458c1895bfc915d8fe8b71bb670140N.dll
-
Size
184KB
-
MD5
ab458c1895bfc915d8fe8b71bb670140
-
SHA1
b8ba186c9146cfd1bc9f7d841ffa9c4297c88704
-
SHA256
2975d6a4d0462ab6d562c2dc01b8c3aaa12f93b953b9395ee6022a53b7670798
-
SHA512
c6661548045f68966da86e43bc3a45ebb735ae1004816d090d271f8401d8788a822b2d1d4426fe1d231c9828ea18db80ebedd74c86941f97a8ac606c0942b27b
-
SSDEEP
3072:092qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMT/rLA:09NSMOEpQ1Q3ODAr+V3
Malware Config
Extracted
Family
dridex
Botnet
22203
C2
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/1432-1-0x0000000074E10000-0x0000000074E3F000-memory.dmp dridex_ldr behavioral2/memory/1432-2-0x0000000074E10000-0x0000000074E3F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 632 1432 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1432 2592 rundll32.exe 84 PID 2592 wrote to memory of 1432 2592 rundll32.exe 84 PID 2592 wrote to memory of 1432 2592 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab458c1895bfc915d8fe8b71bb670140N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab458c1895bfc915d8fe8b71bb670140N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 6243⤵
- Program crash
PID:632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1432 -ip 14321⤵PID:4232