Analysis
-
max time kernel
29s -
max time network
75s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-06-2021 00:58
Static task
static1
General
-
Target
3138b1a764e69f9dd881cec7bf206b530e62d1481737b6e12974bb26e4429a72.dll
-
Size
160KB
-
MD5
3c2385aeb0cf3684a43fce15bb870160
-
SHA1
8b60ca65dcfa648e743f95b3d2de210b3f71a067
-
SHA256
3138b1a764e69f9dd881cec7bf206b530e62d1481737b6e12974bb26e4429a72
-
SHA512
08f2634c521b7e60a3a6b29a9576daa81cf7d04ac5c4318f717f86af9d3fde730d9ffe7cc536809920733ae3da4ea7702157dfb08154e216debda129711fd725
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1416-115-0x00000000738F0000-0x000000007391E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 804 wrote to memory of 1416 804 rundll32.exe rundll32.exe PID 804 wrote to memory of 1416 804 rundll32.exe rundll32.exe PID 804 wrote to memory of 1416 804 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3138b1a764e69f9dd881cec7bf206b530e62d1481737b6e12974bb26e4429a72.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3138b1a764e69f9dd881cec7bf206b530e62d1481737b6e12974bb26e4429a72.dll,#12⤵
- Checks whether UAC is enabled
PID:1416
-