Analysis
-
max time kernel
17s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-06-2021 23:56
Static task
static1
General
-
Target
23876ce058703e3813be02cf9306ceeca7257ec92c16b18f1c74d716baa1be81.dll
-
Size
163KB
-
MD5
4790e03922d86275fc0094ef3bbb2ec4
-
SHA1
9166f23da73bfe02181d6332925d6ed600df4266
-
SHA256
23876ce058703e3813be02cf9306ceeca7257ec92c16b18f1c74d716baa1be81
-
SHA512
3862185124b9eb4c5bff6063ea8b711cf77598a0477ba34dea5aa4cd8e8910af56cd9e4a2e5da517bd44e15d23e4c92add408f8100438cc6d4fea4d1668c59b7
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
43.229.206.212:443
82.209.17.209:8172
162.241.209.225:4125
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/416-115-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3660 416 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3660 WerFault.exe Token: SeBackupPrivilege 3660 WerFault.exe Token: SeDebugPrivilege 3660 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2204 wrote to memory of 416 2204 rundll32.exe rundll32.exe PID 2204 wrote to memory of 416 2204 rundll32.exe rundll32.exe PID 2204 wrote to memory of 416 2204 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23876ce058703e3813be02cf9306ceeca7257ec92c16b18f1c74d716baa1be81.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23876ce058703e3813be02cf9306ceeca7257ec92c16b18f1c74d716baa1be81.dll,#12⤵PID:416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 7203⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-