Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-03-2021 06:19
Static task
static1
Behavioral task
behavioral1
Sample
67c1e48e17bc9e35b50e642ac99e475e1a6faee03ca671cea409bed644287580.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
67c1e48e17bc9e35b50e642ac99e475e1a6faee03ca671cea409bed644287580.dll
-
Size
538KB
-
MD5
8f83a5eaed1994d1a87fa16d77ad7833
-
SHA1
0f3da89a227960d1a87065f02428857c32a39b89
-
SHA256
67c1e48e17bc9e35b50e642ac99e475e1a6faee03ca671cea409bed644287580
-
SHA512
25d0a2c0f3d2885ce3f21a26f7a8b9e1e75aec5cc69f42dc4f9314805e900dd5f0f9149cee750489bb6aeac06dfdf2b7dd15d6fbfeab08c25d183d64257188ad
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
77.220.64.146:443
85.25.134.43:8172
213.208.134.178:6516
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1256-5-0x0000000073FA0000-0x0000000073FDD000-memory.dmp dridex_ldr behavioral1/memory/1256-6-0x0000000073FA0000-0x0000000073FDD000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1932 wrote to memory of 1256 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1256 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1256 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1256 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1256 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1256 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1256 1932 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\67c1e48e17bc9e35b50e642ac99e475e1a6faee03ca671cea409bed644287580.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\67c1e48e17bc9e35b50e642ac99e475e1a6faee03ca671cea409bed644287580.dll2⤵PID:1256
-