Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
e29e468cebd3dd6cc97fc900bbc74d18397abc1a4f19794ebe9905f59c0fce99N.dll
Resource
win7-20240903-en
General
-
Target
e29e468cebd3dd6cc97fc900bbc74d18397abc1a4f19794ebe9905f59c0fce99N.dll
-
Size
184KB
-
MD5
a4a1dc7b3c82b176f1abfa02aa09ae30
-
SHA1
78b2483753d70e8d50149b9edc7be76641069d98
-
SHA256
e29e468cebd3dd6cc97fc900bbc74d18397abc1a4f19794ebe9905f59c0fce99
-
SHA512
f933652df8c54600e7eee809ca4f4f5028d64b31ce7a004b5371bf883c7dcb461a7ed7038441f848e8160c6a887fd10d0d3580d47b1643f6e05a6346d24c73e5
-
SSDEEP
3072:dgkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdg8dA4l:sPFkq6zOe5ilSanODd
Malware Config
Extracted
dridex
22201
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2456-1-0x0000000074F10000-0x0000000074F40000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4216 2456 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4764 wrote to memory of 2456 4764 rundll32.exe rundll32.exe PID 4764 wrote to memory of 2456 4764 rundll32.exe rundll32.exe PID 4764 wrote to memory of 2456 4764 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e29e468cebd3dd6cc97fc900bbc74d18397abc1a4f19794ebe9905f59c0fce99N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e29e468cebd3dd6cc97fc900bbc74d18397abc1a4f19794ebe9905f59c0fce99N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 6163⤵
- Program crash
PID:4216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2456 -ip 24561⤵PID:5092