Analysis
-
max time kernel
110s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
ba35aac2da0e31b19196b85a8dda6f50N.dll
Resource
win7-20240903-en
General
-
Target
ba35aac2da0e31b19196b85a8dda6f50N.dll
-
Size
236KB
-
MD5
ba35aac2da0e31b19196b85a8dda6f50
-
SHA1
564ab3740a444785ad5d07bfb7edc7b967417fce
-
SHA256
0408c940043d7a6c7ee33b858641752e1862b06026b5754a6976419488fa9636
-
SHA512
3d7bf5df1dbd9619a5780cf63781344d9f0ec41e4145e664e3d9ac769ad8f58b5b5cd6bc6b97bbdec78e2781693b772b44e5140933e25d1ab5ff352814139e56
-
SSDEEP
6144:B4V3yyQTz8ITeRDZSw3D2Fsd1u/6mv5/dC:BciyQTdT+swTgt/6c/dC
Malware Config
Extracted
dridex
111
77.220.64.40:443
8.4.9.152:3786
185.246.87.202:3098
Signatures
-
resource yara_rule behavioral2/memory/3852-0-0x0000000075880000-0x00000000758BD000-memory.dmp dridex_ldr behavioral2/memory/3852-3-0x0000000075880000-0x00000000758BD000-memory.dmp dridex_ldr behavioral2/memory/3852-5-0x0000000075880000-0x00000000758BD000-memory.dmp dridex_ldr -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 3852 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3852 4544 rundll32.exe 83 PID 4544 wrote to memory of 3852 4544 rundll32.exe 83 PID 4544 wrote to memory of 3852 4544 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba35aac2da0e31b19196b85a8dda6f50N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba35aac2da0e31b19196b85a8dda6f50N.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3852
-