Analysis
-
max time kernel
19s -
max time network
123s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-06-2021 08:58
Static task
static1
General
-
Target
f139f6b0215de467f6bada5965a5f70eb7bd360fbaf009bdba68f8a7d5f219c9.dll
-
Size
158KB
-
MD5
046928337a52d2f08e96aac4b533954b
-
SHA1
6b5a7a6648e6b3b0783070b46933d9d3ac2dbf6e
-
SHA256
f139f6b0215de467f6bada5965a5f70eb7bd360fbaf009bdba68f8a7d5f219c9
-
SHA512
7d0db6e497eb8bde0b7bf64fb297f44fa1dc40df22f20974fb1a095731eb59fe29190cae96a8169da7f6e5676dadf622459e7e8e76540da54c6478a411966854
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3264-115-0x0000000073A10000-0x0000000073A3D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3916 wrote to memory of 3264 3916 rundll32.exe rundll32.exe PID 3916 wrote to memory of 3264 3916 rundll32.exe rundll32.exe PID 3916 wrote to memory of 3264 3916 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f139f6b0215de467f6bada5965a5f70eb7bd360fbaf009bdba68f8a7d5f219c9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f139f6b0215de467f6bada5965a5f70eb7bd360fbaf009bdba68f8a7d5f219c9.dll,#12⤵
- Checks whether UAC is enabled
PID:3264
-