Analysis
-
max time kernel
54s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
b1300405ab6f20ee1d4c6ae22e0531085daecdee0f74a60588d8618d8998c197.dll
Resource
win7-20240705-en
General
-
Target
b1300405ab6f20ee1d4c6ae22e0531085daecdee0f74a60588d8618d8998c197.dll
-
Size
180KB
-
MD5
15b001e30a90765a5e6a7583fed04f9d
-
SHA1
a3e92cb1686ae5883b82b8338d04ccde78caa2fe
-
SHA256
b1300405ab6f20ee1d4c6ae22e0531085daecdee0f74a60588d8618d8998c197
-
SHA512
cc25ae583bb3295d2ddf9a1b4cbb3f12d4006ce93eadc52924bb36b6504002843ec77acc34144acf5def78d852b4b8e074af6ba31d7ee94ceb4fe9dbba1abf5a
-
SSDEEP
3072:E3U+o/fwAUfM8+NmXhjlAZ+SWlxT5H3zipQIoZeErkxUNBG0:gUZYxfM8+YXfq+SOxTxjipQjzk3
Malware Config
Extracted
dridex
111
94.126.8.2:443
81.2.235.131:1688
178.63.156.139:3388
Signatures
-
resource yara_rule behavioral1/memory/2780-0-0x0000000074F40000-0x0000000074F6E000-memory.dmp dridex_ldr behavioral1/memory/2780-2-0x0000000074F40000-0x0000000074F6E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2780 2060 rundll32.exe 30 PID 2060 wrote to memory of 2780 2060 rundll32.exe 30 PID 2060 wrote to memory of 2780 2060 rundll32.exe 30 PID 2060 wrote to memory of 2780 2060 rundll32.exe 30 PID 2060 wrote to memory of 2780 2060 rundll32.exe 30 PID 2060 wrote to memory of 2780 2060 rundll32.exe 30 PID 2060 wrote to memory of 2780 2060 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1300405ab6f20ee1d4c6ae22e0531085daecdee0f74a60588d8618d8998c197.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1300405ab6f20ee1d4c6ae22e0531085daecdee0f74a60588d8618d8998c197.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2780
-