Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
b6nlu684.rar.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
b6nlu684.rar.dll
-
Size
413KB
-
MD5
c4536bd01e8dbf70620596f4405cc009
-
SHA1
2abc224d7b6e9320ba6d00cc722120a95a5bf88a
-
SHA256
45d498fb79a063579d9d758e553a8c3f6792a1cc5a6979d6734d7afda6684359
-
SHA512
2eca1efda15314bbe7aaca902c3d8824116d193e7a0dac75bd0db14eb8c70bd16be8ee171e1b70b2f704fa77fbab67cd1ce6a2b6f33c81d345d6066647094308
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
104.131.164.93:443
46.101.90.205:4643
27.254.174.84:4443
92.94.251.127:3786
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1896-3-0x0000000000730000-0x000000000076D000-memory.dmp dridex_ldr -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 4 1896 rundll32.exe 7 1896 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 932 wrote to memory of 1896 932 rundll32.exe rundll32.exe PID 932 wrote to memory of 1896 932 rundll32.exe rundll32.exe PID 932 wrote to memory of 1896 932 rundll32.exe rundll32.exe PID 932 wrote to memory of 1896 932 rundll32.exe rundll32.exe PID 932 wrote to memory of 1896 932 rundll32.exe rundll32.exe PID 932 wrote to memory of 1896 932 rundll32.exe rundll32.exe PID 932 wrote to memory of 1896 932 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6nlu684.rar.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6nlu684.rar.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1896