Analysis
-
max time kernel
19s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-06-2021 05:56
Static task
static1
General
-
Target
37d84727a029d2c3d8d0884b050201db72e8ec7ef79ea0da86a76ef12770604f.dll
-
Size
158KB
-
MD5
b4899bbb73b98da3bf00757deddc435d
-
SHA1
f3149b418f2a17449e8fb6d9090129b2a04969dc
-
SHA256
37d84727a029d2c3d8d0884b050201db72e8ec7ef79ea0da86a76ef12770604f
-
SHA512
b8c050758f5144fea2d3cbe313d4a82d92c0a909e98b3a877df9bdaca969c8f323cd1e585a625e03b4c7227f04f8ec135da7eb6e59801576f82514213270f3c3
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1740-115-0x0000000074300000-0x000000007432D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 500 wrote to memory of 1740 500 rundll32.exe rundll32.exe PID 500 wrote to memory of 1740 500 rundll32.exe rundll32.exe PID 500 wrote to memory of 1740 500 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37d84727a029d2c3d8d0884b050201db72e8ec7ef79ea0da86a76ef12770604f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37d84727a029d2c3d8d0884b050201db72e8ec7ef79ea0da86a76ef12770604f.dll,#12⤵
- Checks whether UAC is enabled
PID:1740
-