Analysis
-
max time kernel
95s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
857fb5ef15577a5627424faea4b2a6dd1544e15f4b514ccd650b772747d4863b.dll
Resource
win7-20240903-en
General
-
Target
857fb5ef15577a5627424faea4b2a6dd1544e15f4b514ccd650b772747d4863b.dll
-
Size
184KB
-
MD5
dba5fc32bf1690d87946fa9546dc92b2
-
SHA1
b3613ee3d93aa18adfe7f56947ea29fbeb85ef04
-
SHA256
857fb5ef15577a5627424faea4b2a6dd1544e15f4b514ccd650b772747d4863b
-
SHA512
b8c6bd662b463f4c662fb6668f1ebcba0569539c56a314c65450a2701485544b1d492f38e892650b001930843b7c5759f068dad76e6c0d9eb0f58568cdec5815
-
SSDEEP
3072:MiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoOlzoxss7:MiLVCIT4WK2z1W+CUHZj4Skq/eaoMoC
Malware Config
Extracted
dridex
22202
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Processes:
resource yara_rule behavioral2/memory/5088-1-0x0000000075760000-0x000000007578F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4724 5088 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3856 wrote to memory of 5088 3856 rundll32.exe rundll32.exe PID 3856 wrote to memory of 5088 3856 rundll32.exe rundll32.exe PID 3856 wrote to memory of 5088 3856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\857fb5ef15577a5627424faea4b2a6dd1544e15f4b514ccd650b772747d4863b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\857fb5ef15577a5627424faea4b2a6dd1544e15f4b514ccd650b772747d4863b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 6163⤵
- Program crash
PID:4724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5088 -ip 50881⤵PID:1000