Analysis
-
max time kernel
129s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
1f37c2f248055cb841d03dfdf70260f3b16723476c4dde4c73e3fcca8e33f9c3.dll
Resource
win7-20240708-en
General
-
Target
1f37c2f248055cb841d03dfdf70260f3b16723476c4dde4c73e3fcca8e33f9c3.dll
-
Size
306KB
-
MD5
78d273e063049f495d057ba68aa46338
-
SHA1
1c3bd35dd430c10a4dd2e188ebad12cc85b6fa63
-
SHA256
1f37c2f248055cb841d03dfdf70260f3b16723476c4dde4c73e3fcca8e33f9c3
-
SHA512
59a11efe9e5350c606f87008c22ec549855454e8f0012218f59cdd52e8511683c6ea370462c81359013b54fbd4511da013d9fb3375deabd117bdab6c64914c7e
-
SSDEEP
6144:98N8Nsk2wmMtAH6xX5F2G2z/wbca+kO2:9EhkcMtA05F2G2zIxY
Malware Config
Extracted
dridex
10444
104.255.102.110:443
156.67.218.141:8443
108.170.32.62:3389
82.98.141.106:1443
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4740 wrote to memory of 768 4740 rundll32.exe 81 PID 4740 wrote to memory of 768 4740 rundll32.exe 81 PID 4740 wrote to memory of 768 4740 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f37c2f248055cb841d03dfdf70260f3b16723476c4dde4c73e3fcca8e33f9c3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f37c2f248055cb841d03dfdf70260f3b16723476c4dde4c73e3fcca8e33f9c3.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:768
-