Analysis
-
max time kernel
27s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-06-2021 09:53
Static task
static1
General
-
Target
d8490369c1853e1c51eb88422f54ff0eabad3725ac6a87f1acaa704021c71d13.dll
-
Size
160KB
-
MD5
b3564d597a5eb098e2419d1ab1de8f9c
-
SHA1
42ea6d4f8e6f084c0b9aea1ae6c55e317aaf2e31
-
SHA256
d8490369c1853e1c51eb88422f54ff0eabad3725ac6a87f1acaa704021c71d13
-
SHA512
7c25b0c97b6644ebf12b9d4afe2bf50e002fd56ad59d417adaf7854d6c1af8e2ede7b3200c1e517b485862b289257f919049439b7acaac008ad4a9ab8280d60d
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/4052-115-0x0000000074260000-0x000000007428E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 996 wrote to memory of 4052 996 rundll32.exe rundll32.exe PID 996 wrote to memory of 4052 996 rundll32.exe rundll32.exe PID 996 wrote to memory of 4052 996 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8490369c1853e1c51eb88422f54ff0eabad3725ac6a87f1acaa704021c71d13.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8490369c1853e1c51eb88422f54ff0eabad3725ac6a87f1acaa704021c71d13.dll,#12⤵
- Checks whether UAC is enabled
PID:4052
-