Analysis
-
max time kernel
25s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-06-2021 11:21
Static task
static1
General
-
Target
cd9cd75b4e21d0d3b22a48545096be011b871b3d72fc599247e6f1ed937f1165.dll
-
Size
158KB
-
MD5
0c9ee542dad85419f80c0c4321fe05a7
-
SHA1
c0b6d4c929e757df4082d432a9a803cf087a5c3c
-
SHA256
cd9cd75b4e21d0d3b22a48545096be011b871b3d72fc599247e6f1ed937f1165
-
SHA512
eb164743e62122828673dbfcd4f63047f41b02818e24e95e8deec6638c7e6edc38e5cd35cf3ec058a7ef744075a13e1752a9c626256a60844478087d350f2d0f
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1336-115-0x0000000073F50000-0x0000000073F7D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 856 wrote to memory of 1336 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1336 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1336 856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd9cd75b4e21d0d3b22a48545096be011b871b3d72fc599247e6f1ed937f1165.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd9cd75b4e21d0d3b22a48545096be011b871b3d72fc599247e6f1ed937f1165.dll,#12⤵
- Checks whether UAC is enabled
PID:1336
-