Analysis
-
max time kernel
58s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
74ee7173b230abbc327c01716adcf360N.dll
Resource
win7-20240729-en
General
-
Target
74ee7173b230abbc327c01716adcf360N.dll
-
Size
180KB
-
MD5
74ee7173b230abbc327c01716adcf360
-
SHA1
2d35f978564455da29af48a81448c775c70a9d66
-
SHA256
6a0a794e29c950cd6e603553dd5e5e2d57430f03f241106329462a53c69d9db7
-
SHA512
f1647c020d93b2d28b784c89ef4cbf207f19423dd5b3fb5349bba816154f6ae4d48892b69ebbb9e6c9969c3fba9a49aa1df3aa6aa60e790c624cf6a3df831446
-
SSDEEP
3072:Q3U+o/fwAUfM8+NmXhjlAZ+SWlxT5H3zipQIoZeErkxUNBG0:kUZYxfM8+YXfq+SOxTxjipQjzk3
Malware Config
Extracted
dridex
111
94.126.8.2:443
81.2.235.131:1688
178.63.156.139:3388
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2348-0-0x0000000074A90000-0x0000000074ABE000-memory.dmp dridex_ldr behavioral1/memory/2348-2-0x0000000074A90000-0x0000000074ABE000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 2116 wrote to memory of 2348 2116 rundll32.exe 29 PID 2116 wrote to memory of 2348 2116 rundll32.exe 29 PID 2116 wrote to memory of 2348 2116 rundll32.exe 29 PID 2116 wrote to memory of 2348 2116 rundll32.exe 29 PID 2116 wrote to memory of 2348 2116 rundll32.exe 29 PID 2116 wrote to memory of 2348 2116 rundll32.exe 29 PID 2116 wrote to memory of 2348 2116 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74ee7173b230abbc327c01716adcf360N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74ee7173b230abbc327c01716adcf360N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2348
-