Analysis
-
max time kernel
19s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-06-2021 22:24
Static task
static1
General
-
Target
1f533244cfbc8502ccd5cc45acc3297c831b439ef34429f6f62c0963e3f4a00b.dll
-
Size
160KB
-
MD5
267444943eb4922f927e1627684bc3d5
-
SHA1
706f3bb1e5c62b19b18e92fc7dfb0979acee7c52
-
SHA256
1f533244cfbc8502ccd5cc45acc3297c831b439ef34429f6f62c0963e3f4a00b
-
SHA512
be38050d70d3e739d37139dc2e3571c29cbc2d9196fc4ba7150ebb7ae4dc27c788bfd0393e3cdda299ead7cc3bc868106e5d955830a394e443af78226a1d028a
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3872-115-0x0000000073A10000-0x0000000073A3E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3896 wrote to memory of 3872 3896 rundll32.exe rundll32.exe PID 3896 wrote to memory of 3872 3896 rundll32.exe rundll32.exe PID 3896 wrote to memory of 3872 3896 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f533244cfbc8502ccd5cc45acc3297c831b439ef34429f6f62c0963e3f4a00b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f533244cfbc8502ccd5cc45acc3297c831b439ef34429f6f62c0963e3f4a00b.dll,#12⤵
- Checks whether UAC is enabled
PID:3872
-