Analysis
-
max time kernel
27s -
max time network
69s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
25-06-2021 14:40
Static task
static1
General
-
Target
46536e6ce118d3a6f7ac37ffed119facd934cfb72a12280d4466a8f9af58b21f.dll
-
Size
160KB
-
MD5
2de0a8aff0e59156d8a8e4f8dd226f1a
-
SHA1
da706744d1704e74f43e4d03c2e09845e8c803da
-
SHA256
46536e6ce118d3a6f7ac37ffed119facd934cfb72a12280d4466a8f9af58b21f
-
SHA512
a910de16a31b99c7ed38dcbd6958c0483f0bdae48a82d143190e442a1a76d41d71f2375dcd7f52635d48bfc5a09f1ada0aafe42386cd879ba380c208ba9c1085
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1064-115-0x00000000735F0000-0x000000007361E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 528 wrote to memory of 1064 528 rundll32.exe rundll32.exe PID 528 wrote to memory of 1064 528 rundll32.exe rundll32.exe PID 528 wrote to memory of 1064 528 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46536e6ce118d3a6f7ac37ffed119facd934cfb72a12280d4466a8f9af58b21f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46536e6ce118d3a6f7ac37ffed119facd934cfb72a12280d4466a8f9af58b21f.dll,#12⤵
- Checks whether UAC is enabled
PID:1064