Analysis
-
max time kernel
18s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-06-2021 14:48
Static task
static1
General
-
Target
89f0acc8947bc872b59a680cf0e062065f5323f0d2a12d3e06a7f240fa660635.dll
-
Size
160KB
-
MD5
9716c6b9e52af7aaf6dde62f9ba32271
-
SHA1
6f30c22635203d931a54c39e674d982695adfe05
-
SHA256
89f0acc8947bc872b59a680cf0e062065f5323f0d2a12d3e06a7f240fa660635
-
SHA512
887d3435581485963ae3c3933727d53a58e9721bc669d3ca9106ebc64318a29456536c2dca4af4b647e91b3f59046b0c5806539406b00679bc8b607fc1a030a7
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/748-115-0x0000000073BF0000-0x0000000073C1E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3172 wrote to memory of 748 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 748 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 748 3172 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89f0acc8947bc872b59a680cf0e062065f5323f0d2a12d3e06a7f240fa660635.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89f0acc8947bc872b59a680cf0e062065f5323f0d2a12d3e06a7f240fa660635.dll,#12⤵
- Checks whether UAC is enabled
PID:748
-