Analysis
-
max time kernel
1675s -
max time network
1676s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-11-2024 19:55
Static task
static1
1 signatures
General
-
Target
50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe
-
Size
216KB
-
MD5
018133ba715c9b4b6d78aff4eab51de0
-
SHA1
7a4bb8855e757b0455fbdc6c6f293b8efe4a56af
-
SHA256
50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163e
-
SHA512
515ebfe59269d3d1d5377dada2042c6ffe3cd6da6205096a20bcfd30691669b9d763dc2888d4f465a53616b3c196fb8c1fdbebaeeaea931dfd9ddaeab221353f
-
SSDEEP
3072:+KHeQ1cNWDtPeDoCumpQ7QpF+5yW27o20:PF1cgcDyvWFvWD
Malware Config
Extracted
Family
dridex
C2
5.196.15.119:443
46.105.131.72:443
157.7.163.144:3389
199.119.78.9:4143
Signatures
-
Dridex family
-
Deletes itself 1 IoCs
pid Process 4072 raserver.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 4496 net.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe 4072 raserver.exe 4072 raserver.exe 4072 raserver.exe 4072 raserver.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeRestorePrivilege 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe Token: SeDebugPrivilege 1588 whoami.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2188 wrote to memory of 4072 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe 77 PID 2188 wrote to memory of 4072 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe 77 PID 2188 wrote to memory of 4072 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe 77 PID 2188 wrote to memory of 4072 2188 50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe 77 PID 4072 wrote to memory of 1588 4072 raserver.exe 78 PID 4072 wrote to memory of 1588 4072 raserver.exe 78 PID 4072 wrote to memory of 1588 4072 raserver.exe 78 PID 4072 wrote to memory of 4496 4072 raserver.exe 80 PID 4072 wrote to memory of 4496 4072 raserver.exe 80 PID 4072 wrote to memory of 4496 4072 raserver.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe"C:\Users\Admin\AppData\Local\Temp\50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\raserver.exeC:\Windows\SysWOW64\raserver.exe "C:\Users\Admin\AppData\Local\Temp\50aa36d389a73ab50bd439d3e9d1dd5635206ac29650cda80409313dfc98163eN.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\whoami.exeC:\Windows\system32\whoami.exe /all3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe view3⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:4496
-
-