Analysis
-
max time kernel
29s -
max time network
86s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-03-2021 19:05
Static task
static1
Behavioral task
behavioral1
Sample
12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad.dll
-
Size
188KB
-
MD5
9072fda9208770973fcd357de3fb30ab
-
SHA1
d221aa2a2b90c9cf8f62792c6092d5e5fd04442b
-
SHA256
12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad
-
SHA512
3905afe1f07f55219e9b06fdb3d024d345894a3fe3cde35acd232a0b2768ed64ccfa8f84890a99ebce0913dc5395ac589a45c9bd810b2bc6b43ced369c32e1a1
Malware Config
Extracted
Family
dridex
Botnet
111
C2
116.251.211.158:443
216.10.242.142:6601
37.247.35.137:6601
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1360-4-0x00000000754A0000-0x00000000754D1000-memory.dmp dridex_ldr behavioral1/memory/1360-6-0x00000000754A0000-0x00000000754BF000-memory.dmp dridex_ldr -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 4 1360 rundll32.exe 7 1360 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2028 wrote to memory of 1360 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1360 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1360 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1360 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1360 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1360 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1360 2028 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1360
-