Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
e2d8a3a6a7e66bbbff1fe5e6b97e25aaad47ebffe67b721b1b7ad47fad1dcf3e.dll
Resource
win7-20240708-en
General
-
Target
e2d8a3a6a7e66bbbff1fe5e6b97e25aaad47ebffe67b721b1b7ad47fad1dcf3e.dll
-
Size
608KB
-
MD5
79d1ca4d7b5cd923fffb1958669c2991
-
SHA1
868ab362c5c5281bd2ec3f67b8c0d04d8863319b
-
SHA256
e2d8a3a6a7e66bbbff1fe5e6b97e25aaad47ebffe67b721b1b7ad47fad1dcf3e
-
SHA512
6ccb1ec21d608c1014462c3131edc4a5f7388517ff0c797c7343c6daa93263adfaa5688d815fc85b61d7ac85269516a39521a20e96e3cc54326d9d1e33e4a968
-
SSDEEP
12288:WZGQdqOGKWJqydLqQSeCqsVK8kPRGO35N9mV2zXc64:WZ0ZWjeCVVK8kP9N9oSy
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Signatures
-
Dridex family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 18 540 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1700 wrote to memory of 540 1700 rundll32.exe 83 PID 1700 wrote to memory of 540 1700 rundll32.exe 83 PID 1700 wrote to memory of 540 1700 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2d8a3a6a7e66bbbff1fe5e6b97e25aaad47ebffe67b721b1b7ad47fad1dcf3e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2d8a3a6a7e66bbbff1fe5e6b97e25aaad47ebffe67b721b1b7ad47fad1dcf3e.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:540
-