Analysis
-
max time kernel
25s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
10-06-2021 23:02
Static task
static1
General
-
Target
c6d1e8b7ff95852fe139e74fd6f1b31282d5e97e491fb3a1778cb9df86d8cbc8.dll
-
Size
170KB
-
MD5
30288419cdecc7f0691793e795909c3d
-
SHA1
beca726eb6d7caa44034caecafe949712d04084e
-
SHA256
c6d1e8b7ff95852fe139e74fd6f1b31282d5e97e491fb3a1778cb9df86d8cbc8
-
SHA512
1aea4811ad7e50eeff1d5025a420131a78ef720c83b8443f9482312c7881257ec010b19d1381e62b478e092d1ba695817b2292e5d8f3150a8653c1d95a2a65b9
Malware Config
Extracted
Family
dridex
Botnet
40112
C2
128.199.200.38:443
192.163.233.216:6601
43.229.206.244:4125
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1136-115-0x0000000074160000-0x0000000074190000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1464 1136 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe 1464 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1464 WerFault.exe Token: SeBackupPrivilege 1464 WerFault.exe Token: SeDebugPrivilege 1464 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 996 wrote to memory of 1136 996 rundll32.exe rundll32.exe PID 996 wrote to memory of 1136 996 rundll32.exe rundll32.exe PID 996 wrote to memory of 1136 996 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6d1e8b7ff95852fe139e74fd6f1b31282d5e97e491fb3a1778cb9df86d8cbc8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6d1e8b7ff95852fe139e74fd6f1b31282d5e97e491fb3a1778cb9df86d8cbc8.dll,#12⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 6803⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-