Analysis
-
max time kernel
17s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
11-06-2021 03:17
Static task
static1
General
-
Target
518dfcbbee8d868733107e678357c6208423d9ce56ae2fbc422917efd736f4c0.dll
-
Size
170KB
-
MD5
3bc4a98b47b3df6dd9ee4b3b57853d5c
-
SHA1
c4d95fe1446025e1461a9677e4a00defc3636bed
-
SHA256
518dfcbbee8d868733107e678357c6208423d9ce56ae2fbc422917efd736f4c0
-
SHA512
7d9a55ef5590b8d2408a32ab92b9c43de1206c128f47e364aac111e2aae71d20598e15d681430cf4a896d60602944279429d56ff50d08328fca890ed8f460abe
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
210.65.244.187:443
162.241.41.92:2303
46.231.204.10:8172
185.183.159.100:4125
rc4.plain
rc4.plain
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3568 created 416 3568 WerFault.exe rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/416-115-0x0000000073860000-0x000000007388F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3568 416 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3568 WerFault.exe Token: SeBackupPrivilege 3568 WerFault.exe Token: SeDebugPrivilege 3568 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4056 wrote to memory of 416 4056 rundll32.exe rundll32.exe PID 4056 wrote to memory of 416 4056 rundll32.exe rundll32.exe PID 4056 wrote to memory of 416 4056 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\518dfcbbee8d868733107e678357c6208423d9ce56ae2fbc422917efd736f4c0.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\518dfcbbee8d868733107e678357c6208423d9ce56ae2fbc422917efd736f4c0.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 6483⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken