Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-04-2021 18:10
Static task
static1
General
-
Target
8cf7fdd6fd1e97349dc0e358b45572dfa02b5dd47560b8f23fc15fbc806c1c59.dll
-
Size
154KB
-
MD5
ecc43be3a5b5e8416b248abf29c71f82
-
SHA1
d8b47eadb26bc60390e3a608bc6c7f44bb6bdb6b
-
SHA256
8cf7fdd6fd1e97349dc0e358b45572dfa02b5dd47560b8f23fc15fbc806c1c59
-
SHA512
d49eb721a84c0c6be358eb39a2ba66a7ae84ba18d8c9432b150f408b7e9a954a99446cbb434ffe4534053d5db0938470259f448576e1b501a0ff1013fa100b27
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
159.8.59.82:443
51.91.156.39:2303
67.196.50.240:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3964-115-0x0000000073620000-0x000000007364D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 584 wrote to memory of 3964 584 rundll32.exe rundll32.exe PID 584 wrote to memory of 3964 584 rundll32.exe rundll32.exe PID 584 wrote to memory of 3964 584 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cf7fdd6fd1e97349dc0e358b45572dfa02b5dd47560b8f23fc15fbc806c1c59.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cf7fdd6fd1e97349dc0e358b45572dfa02b5dd47560b8f23fc15fbc806c1c59.dll,#12⤵
- Checks whether UAC is enabled