Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
9f439c727b9c0729e7ff3d597fadd0e0N.dll
Resource
win7-20240705-en
General
-
Target
9f439c727b9c0729e7ff3d597fadd0e0N.dll
-
Size
184KB
-
MD5
9f439c727b9c0729e7ff3d597fadd0e0
-
SHA1
d5f1e2b2d699ad41d03b608aae5ab141d599dedb
-
SHA256
a7112558eec180e34bd7f143624446893caa99b56820382b1a7f803f5ce52827
-
SHA512
7469ca38c1f04340f803f8dd9fa51ac01ea6fc65f913d9d923ea315fca656de5a2c0a6b562299c1d0d5f3872f7f14484d2ad43a6c34a122c009ca17db6db21a0
-
SSDEEP
3072:9JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JPa//2uFrSc:GfYOX+wTScR/Xzku9LVw0uG
Malware Config
Extracted
dridex
22201
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
resource yara_rule behavioral1/memory/3004-1-0x0000000074930000-0x000000007495F000-memory.dmp dridex_ldr behavioral1/memory/3004-2-0x0000000074930000-0x000000007495F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 3004 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2632 wrote to memory of 3004 2632 rundll32.exe 30 PID 2632 wrote to memory of 3004 2632 rundll32.exe 30 PID 2632 wrote to memory of 3004 2632 rundll32.exe 30 PID 2632 wrote to memory of 3004 2632 rundll32.exe 30 PID 2632 wrote to memory of 3004 2632 rundll32.exe 30 PID 2632 wrote to memory of 3004 2632 rundll32.exe 30 PID 2632 wrote to memory of 3004 2632 rundll32.exe 30 PID 3004 wrote to memory of 2888 3004 rundll32.exe 31 PID 3004 wrote to memory of 2888 3004 rundll32.exe 31 PID 3004 wrote to memory of 2888 3004 rundll32.exe 31 PID 3004 wrote to memory of 2888 3004 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f439c727b9c0729e7ff3d597fadd0e0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f439c727b9c0729e7ff3d597fadd0e0N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 2203⤵
- Program crash
PID:2888
-
-