Analysis
-
max time kernel
140s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
bff64e7c3399b711a277033c3cb5e6dce795133d5532f9432131f8d06a415233.dll
Resource
win7-20240729-en
General
-
Target
bff64e7c3399b711a277033c3cb5e6dce795133d5532f9432131f8d06a415233.dll
-
Size
188KB
-
MD5
f65060d6baec4184a56c18c5ba9232e3
-
SHA1
c19e2c66de98630b0c6f80f425332d80d31b15f5
-
SHA256
bff64e7c3399b711a277033c3cb5e6dce795133d5532f9432131f8d06a415233
-
SHA512
ed41ae6535a5196d35142190c12c6ed28cd194c0df36eda08fb43f45d92d29f3a63798e0c0acbb917638114eb0bbc583bcd00ad3087b0928bdb56a79d97bbad4
-
SSDEEP
3072:PteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzv9qM:Xq7fYIHBZkTB6DWruUCOwjt
Malware Config
Extracted
dridex
22201
103.87.173.60:443
45.32.243.209:8116
207.180.208.54:4664
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2792-1-0x0000000075470000-0x00000000754A0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2288 2792 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2896 wrote to memory of 2792 2896 rundll32.exe rundll32.exe PID 2896 wrote to memory of 2792 2896 rundll32.exe rundll32.exe PID 2896 wrote to memory of 2792 2896 rundll32.exe rundll32.exe PID 2896 wrote to memory of 2792 2896 rundll32.exe rundll32.exe PID 2896 wrote to memory of 2792 2896 rundll32.exe rundll32.exe PID 2896 wrote to memory of 2792 2896 rundll32.exe rundll32.exe PID 2896 wrote to memory of 2792 2896 rundll32.exe rundll32.exe PID 2792 wrote to memory of 2288 2792 rundll32.exe WerFault.exe PID 2792 wrote to memory of 2288 2792 rundll32.exe WerFault.exe PID 2792 wrote to memory of 2288 2792 rundll32.exe WerFault.exe PID 2792 wrote to memory of 2288 2792 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bff64e7c3399b711a277033c3cb5e6dce795133d5532f9432131f8d06a415233.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bff64e7c3399b711a277033c3cb5e6dce795133d5532f9432131f8d06a415233.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 3003⤵
- Program crash
PID:2288
-
-