Analysis
-
max time kernel
43s -
max time network
51s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-04-2021 18:10
Static task
static1
General
-
Target
44b68efc8fbe23a848ef927659cd53761e89b2da36f9314fc277edb1adaef8f8.dll
-
Size
154KB
-
MD5
8c82898922911a95e6de257f0fc45185
-
SHA1
4af44ac8fe57248075e481f65260d29c0a3352e8
-
SHA256
44b68efc8fbe23a848ef927659cd53761e89b2da36f9314fc277edb1adaef8f8
-
SHA512
a97b75f3bb11a069d00345d8f65a896465d221e404989c510f6a4f8ef080e69dbede9b43baa0c086b6f3d7b6da191b000414d4274d776d8f51c88fe6ead938c7
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
159.8.59.82:443
51.91.156.39:2303
67.196.50.240:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2156-115-0x0000000073860000-0x000000007388D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1968 wrote to memory of 2156 1968 rundll32.exe rundll32.exe PID 1968 wrote to memory of 2156 1968 rundll32.exe rundll32.exe PID 1968 wrote to memory of 2156 1968 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44b68efc8fbe23a848ef927659cd53761e89b2da36f9314fc277edb1adaef8f8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44b68efc8fbe23a848ef927659cd53761e89b2da36f9314fc277edb1adaef8f8.dll,#12⤵
- Checks whether UAC is enabled
PID:2156
-