Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
e92af5313a84ead5d5a42e167974c070N.dll
Resource
win7-20240708-en
General
-
Target
e92af5313a84ead5d5a42e167974c070N.dll
-
Size
179KB
-
MD5
e92af5313a84ead5d5a42e167974c070
-
SHA1
6ec334edc70f7fded9451b7cb82bb9b027137f92
-
SHA256
cc567a505e3e4df6bdb9fc30e00ef41006a7d22159f7cadc99d291507d7dcc68
-
SHA512
ede283bd83b814a2c7bbbb741eecaf3b1f845fcdcb040641e5477b764d0cde71e32956290f816ccb241fb4d2c2fc96d5d5945bf5067bffadf24b7f54d186ba82
-
SSDEEP
3072:MuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJG:AzWxkOP4p2EesvcDi6DOHPJF
Malware Config
Extracted
dridex
22201
144.76.1.150:443
50.249.212.98:23399
104.168.154.79:5007
Signatures
-
resource yara_rule behavioral2/memory/4276-1-0x0000000075040000-0x0000000075071000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 324 4276 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 4276 212 rundll32.exe 83 PID 212 wrote to memory of 4276 212 rundll32.exe 83 PID 212 wrote to memory of 4276 212 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e92af5313a84ead5d5a42e167974c070N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e92af5313a84ead5d5a42e167974c070N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 6443⤵
- Program crash
PID:324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4276 -ip 42761⤵PID:4808