Analysis
-
max time kernel
42s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 07:19
Static task
static1
Behavioral task
behavioral1
Sample
bcadc20c5130b87a3d197ca534170db0N.dll
Resource
win7-20240903-en
General
-
Target
bcadc20c5130b87a3d197ca534170db0N.dll
-
Size
206KB
-
MD5
bcadc20c5130b87a3d197ca534170db0
-
SHA1
7cd53b122a40295f6d6dccc4d34604875c06f144
-
SHA256
8aea864eebf4947969662e424215fc46da71ec23aee60fd528af9a9b51d1f562
-
SHA512
b785ab86b33d626188fc182cec36fa939194d2dbf914feb38b1869aca79163bcd8e40ef46e0b5b5b2b1d19809bb13dc6c697c814985f16551cc10890d074e84e
-
SSDEEP
3072:Kopj6gTxmzaCEH8nFb369t9EtpiU7FZEz57GEYd4ntfrOulzQh5:tpjtUzy8nF8YN73Ez57Gz4VyWzQv
Malware Config
Extracted
dridex
40111
159.8.59.84:443
198.20.253.36:6601
162.144.76.184:2303
Signatures
-
resource yara_rule behavioral2/memory/408-1-0x00000000749F0000-0x0000000074A25000-memory.dmp dridex_ldr behavioral2/memory/408-4-0x00000000749F0000-0x0000000074A25000-memory.dmp dridex_ldr -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4664 wrote to memory of 408 4664 rundll32.exe 90 PID 4664 wrote to memory of 408 4664 rundll32.exe 90 PID 4664 wrote to memory of 408 4664 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcadc20c5130b87a3d197ca534170db0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcadc20c5130b87a3d197ca534170db0N.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4324,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵PID:2252