Analysis
-
max time kernel
17s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-06-2021 22:50
Static task
static1
General
-
Target
6e55ab79e0a14740041f56c7db73e134944440c38406c38fd5fd0c9800972a54.dll
-
Size
163KB
-
MD5
df73b66b18f35ff68a262275a2f6e6d8
-
SHA1
613aae3c1a7beb2f00da74c3c6495df2c8b54355
-
SHA256
6e55ab79e0a14740041f56c7db73e134944440c38406c38fd5fd0c9800972a54
-
SHA512
a704f237f454860772b69b504d315fa0bb2ac83a9d79f4e01f1b05393ac45ed59dbfbffb0df109d84650e8052ebaf7f305539e8dcb54471ed2918aef77ac6a5d
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
43.229.206.212:443
82.209.17.209:8172
162.241.209.225:4125
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1884-115-0x0000000010000000-0x000000001002E000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3644 1884 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3644 WerFault.exe Token: SeBackupPrivilege 3644 WerFault.exe Token: SeDebugPrivilege 3644 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3988 wrote to memory of 1884 3988 rundll32.exe rundll32.exe PID 3988 wrote to memory of 1884 3988 rundll32.exe rundll32.exe PID 3988 wrote to memory of 1884 3988 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e55ab79e0a14740041f56c7db73e134944440c38406c38fd5fd0c9800972a54.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e55ab79e0a14740041f56c7db73e134944440c38406c38fd5fd0c9800972a54.dll,#12⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 7123⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-