Analysis
-
max time kernel
25s -
max time network
70s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-06-2021 23:57
Static task
static1
General
-
Target
a66f401e247950ebd1e933dbf9e3faaaf384952ce4610f52bc39a0db4c790445.dll
-
Size
160KB
-
MD5
4cc5205292171878563ba950d535ed37
-
SHA1
6b35363284be7a28a75cb700ec8d53a115b49ea2
-
SHA256
a66f401e247950ebd1e933dbf9e3faaaf384952ce4610f52bc39a0db4c790445
-
SHA512
d12c15ce5b6999c5981f4086aaa39f2b98613a957c9d6aa4847bd2abb55d8c947fecf0bd26aebcd1149c9cba55c560f1ec07f926ebba06847cb32e5c73dda395
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/8-115-0x00000000744D0000-0x00000000744FE000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 628 wrote to memory of 8 628 rundll32.exe rundll32.exe PID 628 wrote to memory of 8 628 rundll32.exe rundll32.exe PID 628 wrote to memory of 8 628 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a66f401e247950ebd1e933dbf9e3faaaf384952ce4610f52bc39a0db4c790445.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a66f401e247950ebd1e933dbf9e3faaaf384952ce4610f52bc39a0db4c790445.dll,#12⤵
- Checks whether UAC is enabled
PID:8