Analysis
-
max time kernel
38s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 17:34
Static task
static1
Behavioral task
behavioral1
Sample
05b118452b54c694e51f4e75d6227000188ebc820b1ae0eedd8a478342e763d6.dll
Resource
win7-20240903-en
General
-
Target
05b118452b54c694e51f4e75d6227000188ebc820b1ae0eedd8a478342e763d6.dll
-
Size
180KB
-
MD5
b9b7f01f8dce7a2b4d237642a4564893
-
SHA1
4ecd9ccbe936f92eac6943fe0230f02593b28930
-
SHA256
05b118452b54c694e51f4e75d6227000188ebc820b1ae0eedd8a478342e763d6
-
SHA512
32f9cea5e8fcf6472e9fcacaf33150cc30009f78c42180b139aa1af9ea3c5cd0b6e9857a30f7d15674aee5d26884e3cb14aca1f26df52ca85c4e303fecaa37be
-
SSDEEP
3072:M3U+o/fwAUfM8+NmXhjlAZ+SWlxT5H3zipQIoZeErkxUNBG0:YUZYxfM8+YXfq+SOxTxjipQjzk3
Malware Config
Extracted
dridex
111
94.126.8.2:443
81.2.235.131:1688
178.63.156.139:3388
Signatures
-
resource yara_rule behavioral1/memory/868-1-0x0000000074920000-0x000000007494E000-memory.dmp dridex_ldr behavioral1/memory/868-2-0x0000000074920000-0x000000007494E000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 552 wrote to memory of 868 552 rundll32.exe 30 PID 552 wrote to memory of 868 552 rundll32.exe 30 PID 552 wrote to memory of 868 552 rundll32.exe 30 PID 552 wrote to memory of 868 552 rundll32.exe 30 PID 552 wrote to memory of 868 552 rundll32.exe 30 PID 552 wrote to memory of 868 552 rundll32.exe 30 PID 552 wrote to memory of 868 552 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05b118452b54c694e51f4e75d6227000188ebc820b1ae0eedd8a478342e763d6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05b118452b54c694e51f4e75d6227000188ebc820b1ae0eedd8a478342e763d6.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:868
-