Analysis
-
max time kernel
23s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-06-2021 02:19
Static task
static1
General
-
Target
7385ce6f412a73634313b37f106f41f7bb1929a94fb98813596d67dc6317f906.dll
-
Size
158KB
-
MD5
88fc34b84d2afb79ce1ef3e4ec906c03
-
SHA1
17870843c57e2803f31d686176bf4d378de67001
-
SHA256
7385ce6f412a73634313b37f106f41f7bb1929a94fb98813596d67dc6317f906
-
SHA512
dd635b7565f62115ff14f64ac3a0cf5828ccf115c38c9d3f94525cd7f9a022ee8e44d36e4cd69e0b49bf73a1efe4785c53037cc5f99364ecf92ddf66c15803b2
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1840-115-0x0000000073B80000-0x0000000073BAD000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4056 wrote to memory of 1840 4056 rundll32.exe rundll32.exe PID 4056 wrote to memory of 1840 4056 rundll32.exe rundll32.exe PID 4056 wrote to memory of 1840 4056 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7385ce6f412a73634313b37f106f41f7bb1929a94fb98813596d67dc6317f906.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7385ce6f412a73634313b37f106f41f7bb1929a94fb98813596d67dc6317f906.dll,#12⤵
- Checks whether UAC is enabled
PID:1840
-