Analysis
-
max time kernel
18s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
20-06-2021 04:38
Static task
static1
General
-
Target
31a41f4f6c70e8118417ed5b99183d43e514a1897b08d3f18a216b25171da84f.dll
-
Size
158KB
-
MD5
40b9e924cb10889c8683e24b334b0354
-
SHA1
34069955a5da91a06541b185014daccc475c0d6b
-
SHA256
31a41f4f6c70e8118417ed5b99183d43e514a1897b08d3f18a216b25171da84f
-
SHA512
675254964989564259be601b0d391eed8edfb3db83b22d253315457855bc2c0be09bf5371909780ed6630d8f22bc4d04e4d25b415031f504f31d892762e6f4a1
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3320-115-0x0000000073D70000-0x0000000073D9D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3036 wrote to memory of 3320 3036 rundll32.exe rundll32.exe PID 3036 wrote to memory of 3320 3036 rundll32.exe rundll32.exe PID 3036 wrote to memory of 3320 3036 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31a41f4f6c70e8118417ed5b99183d43e514a1897b08d3f18a216b25171da84f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31a41f4f6c70e8118417ed5b99183d43e514a1897b08d3f18a216b25171da84f.dll,#12⤵
- Checks whether UAC is enabled
PID:3320
-