Analysis
-
max time kernel
17s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-06-2021 23:55
Static task
static1
General
-
Target
d5818b728537d6025b20c1905c4647f68db969cf841ad488b4bcd2f93b019a9b.dll
-
Size
174KB
-
MD5
09ca51df6a9907ed75bf0a7868125b00
-
SHA1
70fc3a71a998efa9163e0adf8fc26e63673ac4d1
-
SHA256
d5818b728537d6025b20c1905c4647f68db969cf841ad488b4bcd2f93b019a9b
-
SHA512
3ca53ef8ce4194969c617883a1e509215bae8f5073c7a9ffc9f48e6d072f19d6e99821ee3141fd560ae4c7d8616d4bfce97611b16212d73ea82e4ef5bf148fcd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
178.128.220.64:30333
45.79.91.89:9987
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3168-115-0x00000000736D0000-0x0000000073700000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3948 3168 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe 3948 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3948 WerFault.exe Token: SeBackupPrivilege 3948 WerFault.exe Token: SeDebugPrivilege 3948 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3172 wrote to memory of 3168 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 3168 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 3168 3172 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5818b728537d6025b20c1905c4647f68db969cf841ad488b4bcd2f93b019a9b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5818b728537d6025b20c1905c4647f68db969cf841ad488b4bcd2f93b019a9b.dll,#12⤵PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 6523⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-