Analysis
-
max time kernel
18s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-06-2021 04:12
Static task
static1
General
-
Target
4f1879f0223411dc5664df5856f9b2ee3fca89f684b9e15185fc05888bbc322d.dll
-
Size
160KB
-
MD5
12fff697a24d1c68d6b044800660003c
-
SHA1
3a437470a569205f160988c2750771f35de5f150
-
SHA256
4f1879f0223411dc5664df5856f9b2ee3fca89f684b9e15185fc05888bbc322d
-
SHA512
1ed7a810528cb089978dbeb1158d4e8ea5987f2646a132ee13587b1f84c8ef6faec67f7d99f1e84650389b2528bb982aba05a6c34267203666ec11b62501017e
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/740-115-0x0000000073BF0000-0x0000000073C1E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3172 wrote to memory of 740 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 740 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 740 3172 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f1879f0223411dc5664df5856f9b2ee3fca89f684b9e15185fc05888bbc322d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f1879f0223411dc5664df5856f9b2ee3fca89f684b9e15185fc05888bbc322d.dll,#12⤵
- Checks whether UAC is enabled
PID:740