Analysis
-
max time kernel
18s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-04-2021 15:46
Static task
static1
Behavioral task
behavioral1
Sample
976c9bed071c1837b65c50318b26d8260ebc6229237a85b18c2ff6ca064a7e9f.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
976c9bed071c1837b65c50318b26d8260ebc6229237a85b18c2ff6ca064a7e9f.dll
-
Size
162KB
-
MD5
e1f55dff7ad75678eecbe8581361cc7f
-
SHA1
eb7165ed534da45224498cbc5834dc8cbc6396da
-
SHA256
976c9bed071c1837b65c50318b26d8260ebc6229237a85b18c2ff6ca064a7e9f
-
SHA512
31ee958a408bf98bce451b8563ca4c20a4933d76bebc890be82d4bb4e470c6e5f909d4524c818168fd6ec11028b9c9f9527435f42c83bb11836bedf44a92adf9
Malware Config
Extracted
Family
dridex
Botnet
40112
C2
107.172.227.10:443
172.93.133.123:2303
108.168.61.147:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2264-115-0x0000000073860000-0x000000007388E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3944 wrote to memory of 2264 3944 rundll32.exe rundll32.exe PID 3944 wrote to memory of 2264 3944 rundll32.exe rundll32.exe PID 3944 wrote to memory of 2264 3944 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\976c9bed071c1837b65c50318b26d8260ebc6229237a85b18c2ff6ca064a7e9f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\976c9bed071c1837b65c50318b26d8260ebc6229237a85b18c2ff6ca064a7e9f.dll,#12⤵
- Checks whether UAC is enabled
PID:2264