Analysis
-
max time kernel
39s -
max time network
64s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
21-01-2021 18:09
Static task
static1
Behavioral task
behavioral1
Sample
bca792b4004c1b91548df22769b235fb.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
bca792b4004c1b91548df22769b235fb.dll
-
Size
236KB
-
MD5
bca792b4004c1b91548df22769b235fb
-
SHA1
c5f3a8fe1860b0ea23bd4589a0d4ca10efe7da4b
-
SHA256
e49a7c26f476a2556574d3b2194e4547be9657d62b37005d272d370039569394
-
SHA512
a485e78c9426f95876316014cb04829567de6da25af5478c4420f40d6586cf35318acef39f43aa01df25f7c647cd014627ee23c1a397df02e3140377f5c2c0d2
Malware Config
Extracted
Family
dridex
Botnet
111
C2
52.73.70.149:443
8.4.9.152:3786
185.246.87.202:3098
50.116.111.64:5353
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2444-3-0x00000000739B0000-0x00000000739ED000-memory.dmp dridex_ldr behavioral2/memory/2444-5-0x00000000739B0000-0x00000000739CF000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1456 wrote to memory of 2444 1456 rundll32.exe rundll32.exe PID 1456 wrote to memory of 2444 1456 rundll32.exe rundll32.exe PID 1456 wrote to memory of 2444 1456 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bca792b4004c1b91548df22769b235fb.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bca792b4004c1b91548df22769b235fb.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2444-2-0x0000000000000000-mapping.dmp
-
memory/2444-3-0x00000000739B0000-0x00000000739ED000-memory.dmpFilesize
244KB
-
memory/2444-4-0x0000000003150000-0x0000000003156000-memory.dmpFilesize
24KB
-
memory/2444-5-0x00000000739B0000-0x00000000739CF000-memory.dmpFilesize
124KB