Analysis
-
max time kernel
110s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 04:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
885eb969becc93c091aac8d558a0d4e0N.dll
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
885eb969becc93c091aac8d558a0d4e0N.dll
-
Size
665KB
-
MD5
885eb969becc93c091aac8d558a0d4e0
-
SHA1
199b5e14020b37ccd4e52cc139f3f68a95cf68c2
-
SHA256
b4ef52631bc1d0c6591d3a942458ec3ce932c8fa6755b25568a0cd95595288d5
-
SHA512
da9a51fca7eba009da8ff464ee8d4a11bc2f69bf7827769cc00bcfca1bb2d23e45d649f2b9033f3c811dc7cc597b045f34e9d105a2a731be4f38a4bb6a2d5fff
-
SSDEEP
12288:TSOP47es0e6yHPJfWqu4bx2zqTiZkWazdB:TBQes0e6yHak
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
144.76.1.150:443
50.249.212.98:23399
104.168.154.79:5007
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2888-0-0x0000000074660000-0x0000000074691000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2092 2888 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2888 2688 rundll32.exe 30 PID 2688 wrote to memory of 2888 2688 rundll32.exe 30 PID 2688 wrote to memory of 2888 2688 rundll32.exe 30 PID 2688 wrote to memory of 2888 2688 rundll32.exe 30 PID 2688 wrote to memory of 2888 2688 rundll32.exe 30 PID 2688 wrote to memory of 2888 2688 rundll32.exe 30 PID 2688 wrote to memory of 2888 2688 rundll32.exe 30 PID 2888 wrote to memory of 2092 2888 rundll32.exe 31 PID 2888 wrote to memory of 2092 2888 rundll32.exe 31 PID 2888 wrote to memory of 2092 2888 rundll32.exe 31 PID 2888 wrote to memory of 2092 2888 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\885eb969becc93c091aac8d558a0d4e0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\885eb969becc93c091aac8d558a0d4e0N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 2203⤵
- Program crash
PID:2092
-
-