Analysis
-
max time kernel
25s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
19-06-2021 10:19
Static task
static1
General
-
Target
8396cd3bd5bcf870c5a1470550bab0eb4d9ce1ae7e185b3ad39972eff5a26745.dll
-
Size
158KB
-
MD5
da67c3109ceb539dd28a257b80da0f40
-
SHA1
db155bc2a470ee46893ba602586a40a0933b1a2e
-
SHA256
8396cd3bd5bcf870c5a1470550bab0eb4d9ce1ae7e185b3ad39972eff5a26745
-
SHA512
eb6270bba838824f437f79dd43477fb61d256e46006df17fb390755377471ecc3d53472a70e3782e50f37c617da5273d40c77157b0bad5f8e5358a860e091b4d
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/912-115-0x0000000073FB0000-0x0000000073FDD000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 632 wrote to memory of 912 632 rundll32.exe rundll32.exe PID 632 wrote to memory of 912 632 rundll32.exe rundll32.exe PID 632 wrote to memory of 912 632 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8396cd3bd5bcf870c5a1470550bab0eb4d9ce1ae7e185b3ad39972eff5a26745.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8396cd3bd5bcf870c5a1470550bab0eb4d9ce1ae7e185b3ad39972eff5a26745.dll,#12⤵
- Checks whether UAC is enabled
PID:912
-