Analysis
-
max time kernel
17s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-06-2021 22:29
Static task
static1
General
-
Target
8f5746f816173991ffdab4db119462826fd891d520584433e2c3fefaee6e5c3d.dll
-
Size
174KB
-
MD5
03721a77b6fc1d740ef53372849215d1
-
SHA1
8f7f9311d8109bb8a9f39b9ce00c7d532a1fbf27
-
SHA256
8f5746f816173991ffdab4db119462826fd891d520584433e2c3fefaee6e5c3d
-
SHA512
441e475227a426800a4a96c36fbf74f6192b57a1e0447397a32474300da5ec6d9ed8afcef88cf79c12e0c85fc5f5daf8da45fb809bad7754f1ade8c284b6bc0e
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
178.128.220.64:30333
45.79.91.89:9987
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/64-115-0x0000000073A90000-0x0000000073AC0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3288 64 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3288 WerFault.exe Token: SeBackupPrivilege 3288 WerFault.exe Token: SeDebugPrivilege 3288 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 512 wrote to memory of 64 512 rundll32.exe rundll32.exe PID 512 wrote to memory of 64 512 rundll32.exe rundll32.exe PID 512 wrote to memory of 64 512 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f5746f816173991ffdab4db119462826fd891d520584433e2c3fefaee6e5c3d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f5746f816173991ffdab4db119462826fd891d520584433e2c3fefaee6e5c3d.dll,#12⤵PID:64
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 6483⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288
-
-