Analysis
-
max time kernel
18s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-06-2021 23:55
Static task
static1
General
-
Target
4ab9cbfc89ffd1638a541e273a5df57f08f8e3a016771137a296517c94ea38dd.dll
-
Size
174KB
-
MD5
1577fa8fcefd5226d4dcd648121ca7b2
-
SHA1
351883a62b31eafda954a36a287d671b56d18336
-
SHA256
4ab9cbfc89ffd1638a541e273a5df57f08f8e3a016771137a296517c94ea38dd
-
SHA512
7f5bf504bba1a94902aec92d00e10a8cbad77e4cc7d56150b39399d59620bfb189a0eb6facfe58adfb62e94e63c1df81c96dbac65852f30b0cafd8974b2ec24a
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
178.128.220.64:30333
45.79.91.89:9987
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/504-115-0x0000000073A90000-0x0000000073AC0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2804 504 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2804 WerFault.exe Token: SeBackupPrivilege 2804 WerFault.exe Token: SeDebugPrivilege 2804 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3904 wrote to memory of 504 3904 rundll32.exe rundll32.exe PID 3904 wrote to memory of 504 3904 rundll32.exe rundll32.exe PID 3904 wrote to memory of 504 3904 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ab9cbfc89ffd1638a541e273a5df57f08f8e3a016771137a296517c94ea38dd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ab9cbfc89ffd1638a541e273a5df57f08f8e3a016771137a296517c94ea38dd.dll,#12⤵PID:504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 6443⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-