Analysis
-
max time kernel
26s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-06-2021 04:41
Static task
static1
General
-
Target
eb1e587a916f4f999e7a2d0721db15f873e65e9285a51aa2573f9820ab512fa7.dll
-
Size
160KB
-
MD5
a1399fa8b7bb8346a5582b16ea7eb8ac
-
SHA1
5c60ba7ab295934106a24ab17ad359a547a5e050
-
SHA256
eb1e587a916f4f999e7a2d0721db15f873e65e9285a51aa2573f9820ab512fa7
-
SHA512
1aca64918c43948be407c82f751aeed6261fe19fcc260bc97595c04c70fc7eadb81199f2c5bb7d20f5e21510ab32e9deee07445c1eefdae00eb55c78f9ee64d4
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/4052-115-0x0000000073620000-0x000000007364E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 504 wrote to memory of 4052 504 rundll32.exe rundll32.exe PID 504 wrote to memory of 4052 504 rundll32.exe rundll32.exe PID 504 wrote to memory of 4052 504 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb1e587a916f4f999e7a2d0721db15f873e65e9285a51aa2573f9820ab512fa7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb1e587a916f4f999e7a2d0721db15f873e65e9285a51aa2573f9820ab512fa7.dll,#12⤵
- Checks whether UAC is enabled
PID:4052
-