Analysis
-
max time kernel
136s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
02da56ab49f16bbb06c64e8cf2278700N.dll
Resource
win7-20240729-en
General
-
Target
02da56ab49f16bbb06c64e8cf2278700N.dll
-
Size
188KB
-
MD5
02da56ab49f16bbb06c64e8cf2278700
-
SHA1
c469e75ba3cf51e505820673d54945bd5fbed6a8
-
SHA256
c9d5808e3607fefa76c993ecf7eb992051aab448d67addd55aefcbb5548e95fc
-
SHA512
d1a57139421e5fee69403ede32aa013d113b8e87b75c4881316859cdc73095aa294a7fdb68d4501c000f5d43d047214c91a8256541a80279c8316b42efc2fc06
-
SSDEEP
3072:dWa3N1eqJ7cNe58per6JpynepWHVD9qMe402JYIUk9H8Iz83SWr9klSC:7xwO/Spynep6VDcMeQeIUk9cI6j5
Malware Config
Extracted
dridex
22202
134.209.182.12:443
188.40.100.254:4664
103.109.247.9:10443
Signatures
-
resource yara_rule behavioral2/memory/4584-0-0x0000000074E50000-0x0000000074E80000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 4952 4584 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4584 4016 rundll32.exe 84 PID 4016 wrote to memory of 4584 4016 rundll32.exe 84 PID 4016 wrote to memory of 4584 4016 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02da56ab49f16bbb06c64e8cf2278700N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02da56ab49f16bbb06c64e8cf2278700N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 6483⤵
- Program crash
PID:4952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4584 -ip 45841⤵PID:4544