Analysis
-
max time kernel
26s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
19-06-2021 02:51
Static task
static1
General
-
Target
d3d1fa2df20702de1ef7b21a21f13e8d291ca8bc317a4c46c3c57c5a57a7b823.dll
-
Size
160KB
-
MD5
1ad28c39267e11f260413adfe795507f
-
SHA1
938fae861ceeb534a725c04d38afdc8ba094ec8f
-
SHA256
d3d1fa2df20702de1ef7b21a21f13e8d291ca8bc317a4c46c3c57c5a57a7b823
-
SHA512
e36246d20dcf5c97dc0a59ab3d4f019203ff1117c3f51c8963dc2deb096c3ff11d916b30a02bc982b9e1498c5d471ccd7955c6a02b9279ae3dd88c114ea742ab
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1032-115-0x0000000073ED0000-0x0000000073EFE000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 900 wrote to memory of 1032 900 rundll32.exe rundll32.exe PID 900 wrote to memory of 1032 900 rundll32.exe rundll32.exe PID 900 wrote to memory of 1032 900 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d1fa2df20702de1ef7b21a21f13e8d291ca8bc317a4c46c3c57c5a57a7b823.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d1fa2df20702de1ef7b21a21f13e8d291ca8bc317a4c46c3c57c5a57a7b823.dll,#12⤵
- Checks whether UAC is enabled
PID:1032
-