Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
f61868611d8833f31ea0600976087540N.dll
Resource
win7-20240708-en
General
-
Target
f61868611d8833f31ea0600976087540N.dll
-
Size
184KB
-
MD5
f61868611d8833f31ea0600976087540
-
SHA1
e83f202aa3f9b3d106f984a45c40fb256eb6caed
-
SHA256
cd06ca9ad10c83fd4501c65878d84d2b4a4d47f1f8751827f8b83f66ae9d0129
-
SHA512
ba031d214ff0efd2f77c68ce272cc4185b0c97bc2411edda51b356ae238ab260bf09c8a194620a21fd09a5dd4ed488312647976301dda18b919a9573a03dad2c
-
SSDEEP
3072:QiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao/lzoxss7:QiLVCIT4WK2z1W+CUHZj4Skq/eaodoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
resource yara_rule behavioral2/memory/4668-1-0x0000000075540000-0x000000007556F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4236 4668 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 732 wrote to memory of 4668 732 rundll32.exe 84 PID 732 wrote to memory of 4668 732 rundll32.exe 84 PID 732 wrote to memory of 4668 732 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f61868611d8833f31ea0600976087540N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f61868611d8833f31ea0600976087540N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 6163⤵
- Program crash
PID:4236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4668 -ip 46681⤵PID:4836