Analysis
-
max time kernel
20s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15/06/2021, 11:21
Static task
static1
General
-
Target
9660f3beeef6aee44627e1252900b5709da451eb649505ce7567d13c31474b70.dll
-
Size
170KB
-
MD5
305cde8b843da34d313aaec59245f674
-
SHA1
06068e6e40bbb945b23a4281137d1c60d3f6487b
-
SHA256
9660f3beeef6aee44627e1252900b5709da451eb649505ce7567d13c31474b70
-
SHA512
df81bd9c1c7def6ab9b0fad5beee5d2d91e7e003536d97b70751c4d20b52682ddbf0167c0911b11e90abbca3c4915960d027cd4d9b724b85e400b7dbbd3ec139
Malware Config
Extracted
Family
dridex
Botnet
40112
C2
128.199.200.38:443
192.163.233.216:6601
43.229.206.244:4125
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/4452-115-0x0000000074290000-0x00000000742C0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1936 4452 WerFault.exe 52 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1936 WerFault.exe Token: SeBackupPrivilege 1936 WerFault.exe Token: SeDebugPrivilege 1936 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4452 4440 rundll32.exe 52 PID 4440 wrote to memory of 4452 4440 rundll32.exe 52 PID 4440 wrote to memory of 4452 4440 rundll32.exe 52
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9660f3beeef6aee44627e1252900b5709da451eb649505ce7567d13c31474b70.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9660f3beeef6aee44627e1252900b5709da451eb649505ce7567d13c31474b70.dll,#12⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 6763⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-