Analysis
-
max time kernel
93s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
78f460b30cf8a63f637479d6697dce10N.dll
Resource
win7-20240704-en
General
-
Target
78f460b30cf8a63f637479d6697dce10N.dll
-
Size
196KB
-
MD5
78f460b30cf8a63f637479d6697dce10
-
SHA1
e5b1d85f5321bd0b2df86faa8ce695dd75708116
-
SHA256
f478f5ad250e88751fcb69dc044f853969fac42115f0dc2c82c81334f950829d
-
SHA512
f76c826528528f07e4f996ed028795d98162d1c26ae14ed9334ff09f95ad2f1791af9fb19d2da87414ce0ffb66d879a0cabc96f1aff4cd41c6cf405bd3515860
-
SSDEEP
3072:luCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJl:pzWxkOP4p2EesvcDi6DOHPJq
Malware Config
Extracted
dridex
22201
144.76.1.150:443
50.249.212.98:23399
104.168.154.79:5007
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3600-0-0x0000000074B80000-0x0000000074BB1000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3368 3600 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5064 wrote to memory of 3600 5064 rundll32.exe rundll32.exe PID 5064 wrote to memory of 3600 5064 rundll32.exe rundll32.exe PID 5064 wrote to memory of 3600 5064 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\78f460b30cf8a63f637479d6697dce10N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\78f460b30cf8a63f637479d6697dce10N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 6403⤵
- Program crash
PID:3368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3600 -ip 36001⤵PID:3452