Analysis
-
max time kernel
25s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-06-2021 16:12
Static task
static1
General
-
Target
aa10846a241e326def7f971dfaeaba5eb4f1db847243beae8ac9ded764e3b159.dll
-
Size
160KB
-
MD5
e6e6b2aa00736aa27568fa567e6c4d74
-
SHA1
20490225c1327f39991e54eb9c99ae2b6c4e4200
-
SHA256
aa10846a241e326def7f971dfaeaba5eb4f1db847243beae8ac9ded764e3b159
-
SHA512
0b9775e194f38387c34fb6531c13de1c7bd837c8e0a3d400a7a8fe4da0de7cbff330b23a075d888aebac03c680741525eccced5c5d1938ae1fbb02c974e5605f
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1484-115-0x0000000073890000-0x00000000738BE000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2840 wrote to memory of 1484 2840 rundll32.exe rundll32.exe PID 2840 wrote to memory of 1484 2840 rundll32.exe rundll32.exe PID 2840 wrote to memory of 1484 2840 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa10846a241e326def7f971dfaeaba5eb4f1db847243beae8ac9ded764e3b159.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa10846a241e326def7f971dfaeaba5eb4f1db847243beae8ac9ded764e3b159.dll,#12⤵
- Checks whether UAC is enabled
PID:1484