Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 13:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Trojan.Win32.Dridex.dll
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
Trojan.Win32.Dridex.dll
-
Size
1.1MB
-
MD5
76b00a7f7ec5a3465e74d8ee5a9cdf80
-
SHA1
f9f99129cf8155ff7191763f59e8bc54ef2bab9a
-
SHA256
d63881d5b89c883053a28137aaea7134732c6bdfaa596783598a3e675df711c7
-
SHA512
c976a46d82bf6631f1fe378cec99fbab24ef1546ecc967239b86f8d70304a8d752aa9d25bdfea9e7fcd2f64ab15b5f002991585b6088b793bdf4d48ffa09e9df
-
SSDEEP
12288:zSOP47es0e6yHPJGcJh+U6HKsc2Gs8PJjDKvq3kvTMnsW1qraaEXA8:zBQes0e6yHF
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
144.76.1.150:443
50.249.212.98:23399
104.168.154.79:5007
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/3624-0-0x0000000074A40000-0x0000000074A71000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2920 3624 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 3624 2312 rundll32.exe 82 PID 2312 wrote to memory of 3624 2312 rundll32.exe 82 PID 2312 wrote to memory of 3624 2312 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Dridex.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Dridex.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 6363⤵
- Program crash
PID:2920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3624 -ip 36241⤵PID:5112