Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
f510f9e638d852bbbed878fab7679ec770cdf647c92c1c73653b457facf848c4N.dll
Resource
win7-20240729-en
General
-
Target
f510f9e638d852bbbed878fab7679ec770cdf647c92c1c73653b457facf848c4N.dll
-
Size
184KB
-
MD5
4f79584a5c40828c361572fadc6f09a0
-
SHA1
8409549544af811e0497aec19e2f375c627b418c
-
SHA256
f510f9e638d852bbbed878fab7679ec770cdf647c92c1c73653b457facf848c4
-
SHA512
63da05ae88f4efdf7afb31da4997f9b90a5d27694f07bcb92a526fec244a6d16e0d54a9fdf961b3ccb771fca1700d60026889d8e346e03f81be04640b1267e08
-
SSDEEP
3072:U92qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTQrLA:U9NSMOEpQ1Q3ODAr+V8
Malware Config
Extracted
dridex
22203
80.241.218.90:443
103.161.172.109:13786
87.98.128.76:5723
Signatures
-
Dridex family
-
Processes:
resource yara_rule behavioral2/memory/3940-1-0x0000000074F50000-0x0000000074F7F000-memory.dmp dridex_ldr behavioral2/memory/3940-2-0x0000000074F50000-0x0000000074F7F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1364 3940 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4584 wrote to memory of 3940 4584 rundll32.exe rundll32.exe PID 4584 wrote to memory of 3940 4584 rundll32.exe rundll32.exe PID 4584 wrote to memory of 3940 4584 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f510f9e638d852bbbed878fab7679ec770cdf647c92c1c73653b457facf848c4N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f510f9e638d852bbbed878fab7679ec770cdf647c92c1c73653b457facf848c4N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 6163⤵
- Program crash
PID:1364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3940 -ip 39401⤵PID:2644