Analysis
-
max time kernel
25s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-06-2021 10:59
Static task
static1
General
-
Target
6ffd4edc388be076f27bf34675b11873690e1796a17bab4ca104ca0863a29738.dll
-
Size
158KB
-
MD5
185bb0d1a40118cc9bdbcb5042d03591
-
SHA1
0c765953e194ee3ba173cac89c312c6f2a5c972c
-
SHA256
6ffd4edc388be076f27bf34675b11873690e1796a17bab4ca104ca0863a29738
-
SHA512
94301bca03d53e1dd7f79d77d0a22394f2a906a61cbf623f8232fc69ac242dce921d91b4aac8485d3904debcadab19911c601bad47d750e9678aec00f22b3f3a
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1292-115-0x0000000074300000-0x000000007432D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 568 wrote to memory of 1292 568 rundll32.exe rundll32.exe PID 568 wrote to memory of 1292 568 rundll32.exe rundll32.exe PID 568 wrote to memory of 1292 568 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ffd4edc388be076f27bf34675b11873690e1796a17bab4ca104ca0863a29738.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ffd4edc388be076f27bf34675b11873690e1796a17bab4ca104ca0863a29738.dll,#12⤵
- Checks whether UAC is enabled
PID:1292
-