Analysis
-
max time kernel
26s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-06-2021 13:24
Static task
static1
General
-
Target
525cd9c1510145b91839a6915917c7de5cc53f938d0b99242d3f8021fea90b9b.dll
-
Size
158KB
-
MD5
a95f7d93dbc05802340bb7e71372c1f4
-
SHA1
4efa293dd017bbb239874cf28c0d13521706fd48
-
SHA256
525cd9c1510145b91839a6915917c7de5cc53f938d0b99242d3f8021fea90b9b
-
SHA512
868f49c4c3abf8a06c6aad35d702b9c0b35249a1ac91f5cf8106b22a2628686e1f1a03541a3333ef79d44cd0785f5b3ce414f5e6e51e99e0348b5bcf7720dc6c
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-115-0x0000000073D90000-0x0000000073DBD000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 856 wrote to memory of 1200 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1200 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1200 856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\525cd9c1510145b91839a6915917c7de5cc53f938d0b99242d3f8021fea90b9b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\525cd9c1510145b91839a6915917c7de5cc53f938d0b99242d3f8021fea90b9b.dll,#12⤵
- Checks whether UAC is enabled
PID:1200
-