Analysis
-
max time kernel
26s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
19-06-2021 03:34
Static task
static1
General
-
Target
584973ba7cd40df321fd5f2c31a2f5d90c7e473a39928603973e9f7d0c302d31.dll
-
Size
158KB
-
MD5
a064544d27761f11c4d997cade9a8221
-
SHA1
23372cc1ed656b2c5418a0c87cdadefdd5834404
-
SHA256
584973ba7cd40df321fd5f2c31a2f5d90c7e473a39928603973e9f7d0c302d31
-
SHA512
302d4bfc8a28d8f12dd09c6bf43650cdc97edf1912067d07b55863ecc724ef7f39a24fba3a0f6ffa2087456c5ceaf2eacb3bd953d25536cec749be25bbf7d782
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/848-115-0x00000000742C0000-0x00000000742ED000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 636 wrote to memory of 848 636 rundll32.exe rundll32.exe PID 636 wrote to memory of 848 636 rundll32.exe rundll32.exe PID 636 wrote to memory of 848 636 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\584973ba7cd40df321fd5f2c31a2f5d90c7e473a39928603973e9f7d0c302d31.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\584973ba7cd40df321fd5f2c31a2f5d90c7e473a39928603973e9f7d0c302d31.dll,#12⤵
- Checks whether UAC is enabled
PID:848
-