Analysis
-
max time kernel
32s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
30-03-2021 22:34
Static task
static1
Behavioral task
behavioral1
Sample
03bb64d1d0d91623bd8d83e769e97d39cf8175584dce06bc07936a8050ee4e41.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
03bb64d1d0d91623bd8d83e769e97d39cf8175584dce06bc07936a8050ee4e41.dll
-
Size
562KB
-
MD5
3d0fffa0fe157c3bffb917e6a8d9da2e
-
SHA1
3e7f43dda78e1d8136bbbb1bf28667d4632c661e
-
SHA256
03bb64d1d0d91623bd8d83e769e97d39cf8175584dce06bc07936a8050ee4e41
-
SHA512
aede69afc0203edb7162e0fe48bdbc5ff6ab43945a478b5b0ccbb49aa81014778b1f14ceda25e21fd98bc224da24e962cc1124523a626f7488b3817dfeaeb926
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
210.65.244.176:443
37.34.58.210:6601
77.220.64.141:5037
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/1248-3-0x0000000074260000-0x000000007429D000-memory.dmp dridex_ldr behavioral2/memory/1248-4-0x0000000074260000-0x000000007429D000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1248 1032 regsvr32.exe 66 PID 1032 wrote to memory of 1248 1032 regsvr32.exe 66 PID 1032 wrote to memory of 1248 1032 regsvr32.exe 66
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\03bb64d1d0d91623bd8d83e769e97d39cf8175584dce06bc07936a8050ee4e41.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\03bb64d1d0d91623bd8d83e769e97d39cf8175584dce06bc07936a8050ee4e41.dll2⤵PID:1248
-