Analysis
-
max time kernel
19s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-06-2021 17:31
Static task
static1
General
-
Target
163f909cefee8e37d5e8c3d2fb92aac9d8377d784b078071253ec848d6333253.dll
-
Size
158KB
-
MD5
9b629a4035f480ab9583de720b4342a7
-
SHA1
8e4f8f48aab6ad5dd4ec65bb43b35502d80cf8a8
-
SHA256
163f909cefee8e37d5e8c3d2fb92aac9d8377d784b078071253ec848d6333253
-
SHA512
f3b66d993faa724780bf0bf045eb3daaf45ce399ab0ea84357f02e5a328ac8925b594af042354264018d0409072f1e2c4da8d11c86fc7bc49b181b1346c7914c
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2060-115-0x0000000074480000-0x00000000744AD000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4016 wrote to memory of 2060 4016 rundll32.exe rundll32.exe PID 4016 wrote to memory of 2060 4016 rundll32.exe rundll32.exe PID 4016 wrote to memory of 2060 4016 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\163f909cefee8e37d5e8c3d2fb92aac9d8377d784b078071253ec848d6333253.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\163f909cefee8e37d5e8c3d2fb92aac9d8377d784b078071253ec848d6333253.dll,#12⤵
- Checks whether UAC is enabled
PID:2060
-