Analysis
-
max time kernel
18s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
19-06-2021 07:35
Static task
static1
General
-
Target
2d8c1e63c0192243f13d7a2a40d7fbee5e919911a363d1304c8266261921a51a.dll
-
Size
160KB
-
MD5
152e95d407df5a87b39366756ba8ed60
-
SHA1
366e87de89726a6ab84df25790a7add1eed14de3
-
SHA256
2d8c1e63c0192243f13d7a2a40d7fbee5e919911a363d1304c8266261921a51a
-
SHA512
48276fdc6eee1c50ac1c7cdd3aead407757931c524863df3419bc46a491a60be9a314b03915c3ae3760f49583bac3bc49779ab0bdf7e5acf53063d19be9053cc
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/752-115-0x00000000739B0000-0x00000000739DE000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 508 wrote to memory of 752 508 rundll32.exe rundll32.exe PID 508 wrote to memory of 752 508 rundll32.exe rundll32.exe PID 508 wrote to memory of 752 508 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d8c1e63c0192243f13d7a2a40d7fbee5e919911a363d1304c8266261921a51a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d8c1e63c0192243f13d7a2a40d7fbee5e919911a363d1304c8266261921a51a.dll,#12⤵
- Checks whether UAC is enabled
PID:752
-