Analysis
-
max time kernel
18s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
19-06-2021 23:48
Static task
static1
General
-
Target
55e12b013331a5efc05a0b272336fdd95945d9c67b005acc0760187dd827593d.dll
-
Size
158KB
-
MD5
027c15d122166d365e916afe46b5c48d
-
SHA1
f58d56950d1fb67173c0fde036d17e0ade10ca94
-
SHA256
55e12b013331a5efc05a0b272336fdd95945d9c67b005acc0760187dd827593d
-
SHA512
fc57ca7b2d9e24aa1f9bca38d07b31e171456818e09ffee8aa14bc837b19ae81c789317697a3ef2392f35ea875ee9b32d1393d64eefa80e556eca95bec7bb1e9
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1892-115-0x0000000073660000-0x000000007368D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4012 wrote to memory of 1892 4012 rundll32.exe rundll32.exe PID 4012 wrote to memory of 1892 4012 rundll32.exe rundll32.exe PID 4012 wrote to memory of 1892 4012 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\55e12b013331a5efc05a0b272336fdd95945d9c67b005acc0760187dd827593d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\55e12b013331a5efc05a0b272336fdd95945d9c67b005acc0760187dd827593d.dll,#12⤵
- Checks whether UAC is enabled
PID:1892
-