Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
16-05-2021 00:19
Static task
static1
General
-
Target
ecde835ba7193d93f5116151a64ae4a47f21b5e6a5bff2f5ae9967ef907ed6cb.dll
-
Size
162KB
-
MD5
3198aa867e74a913749ffdf4e11aee10
-
SHA1
d130367213644ea574a7ad7b0d543e1e5fb5c35a
-
SHA256
ecde835ba7193d93f5116151a64ae4a47f21b5e6a5bff2f5ae9967ef907ed6cb
-
SHA512
055af6f200ad45e5c11fa84c8d639134076381e414d8ef29ec6ea34b042079a7394c849692687f88d55f43f27d78bfbcbcd885f756b9e8b3966385551506a386
Malware Config
Extracted
Family
dridex
Botnet
40112
C2
107.172.227.10:443
172.93.133.123:2303
108.168.61.147:8172
rc4.plain
rc4.plain
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
resource yara_rule behavioral1/memory/964-115-0x0000000073AA0000-0x0000000073ACE000-memory.dmp dridex_ldr -
Executes dropped EXE 1 IoCs
pid Process 3224 C857.tmp -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CompareSend.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\ConfirmUndo.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\EnterRegister.tiff rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\C857.tmp rundll32.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4056 schtasks.exe 3728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 3224 C857.tmp 3224 C857.tmp 3224 C857.tmp 3224 C857.tmp 3224 C857.tmp 3224 C857.tmp 936 rundll32.exe 936 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 936 rundll32.exe Token: SeDebugPrivilege 936 rundll32.exe Token: SeTcbPrivilege 936 rundll32.exe Token: SeDebugPrivilege 3224 C857.tmp -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2016 wrote to memory of 964 2016 rundll32.exe 53 PID 2016 wrote to memory of 964 2016 rundll32.exe 53 PID 2016 wrote to memory of 964 2016 rundll32.exe 53 PID 3932 wrote to memory of 936 3932 rundll32.exe 81 PID 3932 wrote to memory of 936 3932 rundll32.exe 81 PID 3932 wrote to memory of 936 3932 rundll32.exe 81 PID 936 wrote to memory of 2372 936 rundll32.exe 82 PID 936 wrote to memory of 2372 936 rundll32.exe 82 PID 936 wrote to memory of 2372 936 rundll32.exe 82 PID 2372 wrote to memory of 2864 2372 cmd.exe 84 PID 2372 wrote to memory of 2864 2372 cmd.exe 84 PID 2372 wrote to memory of 2864 2372 cmd.exe 84 PID 936 wrote to memory of 2504 936 rundll32.exe 85 PID 936 wrote to memory of 2504 936 rundll32.exe 85 PID 936 wrote to memory of 2504 936 rundll32.exe 85 PID 936 wrote to memory of 2512 936 rundll32.exe 88 PID 936 wrote to memory of 2512 936 rundll32.exe 88 PID 936 wrote to memory of 2512 936 rundll32.exe 88 PID 2504 wrote to memory of 4056 2504 cmd.exe 87 PID 2504 wrote to memory of 4056 2504 cmd.exe 87 PID 2504 wrote to memory of 4056 2504 cmd.exe 87 PID 936 wrote to memory of 3224 936 rundll32.exe 89 PID 936 wrote to memory of 3224 936 rundll32.exe 89 PID 2512 wrote to memory of 3728 2512 cmd.exe 92 PID 2512 wrote to memory of 3728 2512 cmd.exe 92 PID 2512 wrote to memory of 3728 2512 cmd.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecde835ba7193d93f5116151a64ae4a47f21b5e6a5bff2f5ae9967ef907ed6cb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecde835ba7193d93f5116151a64ae4a47f21b5e6a5bff2f5ae9967ef907ed6cb.dll,#12⤵
- Checks whether UAC is enabled
PID:964
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\infpub.dat",#2 151⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Modifies extensions of user files
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3639060505 && exit"3⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3639060505 && exit"4⤵
- Creates scheduled task(s)
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:41:003⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:41:004⤵
- Creates scheduled task(s)
PID:3728
-
-
-
C:\Windows\C857.tmp"C:\Windows\C857.tmp" \\.\pipe\{549FF87C-E091-4ADA-A6BF-6992F19CAAB5}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-