Analysis
-
max time kernel
26s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-06-2021 07:13
Static task
static1
General
-
Target
88736156d745e217ff2fe7bf163808de400722ad554a3e5ee2b3cc926541a22d.dll
-
Size
160KB
-
MD5
33818724a13cae1e046bf22e2055a5a1
-
SHA1
d9af2813606bea2611c3e0e772d8a7baaa014e1e
-
SHA256
88736156d745e217ff2fe7bf163808de400722ad554a3e5ee2b3cc926541a22d
-
SHA512
d7eed32289d3257f5116b5d28b95a1f664bc7ce9d9cac39c51f6a5985c3bcf64a7697ca063afb9a97e29731221817d7f5521c7ff7cfda3820b3d5d039d674b85
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1344-115-0x0000000073F50000-0x0000000073F7E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 856 wrote to memory of 1344 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1344 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1344 856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88736156d745e217ff2fe7bf163808de400722ad554a3e5ee2b3cc926541a22d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88736156d745e217ff2fe7bf163808de400722ad554a3e5ee2b3cc926541a22d.dll,#12⤵
- Checks whether UAC is enabled
PID:1344
-