Analysis
-
max time kernel
27s -
max time network
68s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-06-2021 07:03
Static task
static1
General
-
Target
c367ad39c381c7d56159ed068e73a27bc6b78c20f69959454de3d71029b9a048.dll
-
Size
160KB
-
MD5
025c372e5df8ec25de936b4184cf0558
-
SHA1
801d3f6eed21a293fbf8260d723a9a84e773ddc7
-
SHA256
c367ad39c381c7d56159ed068e73a27bc6b78c20f69959454de3d71029b9a048
-
SHA512
841d092b4a6411d84aa3391a5cdc0f94c8dc841fccd8795a7f77c396ebe67bc3eceab062f4609c3585f7176ff47a1451230c00b108c16179b7fe8c912cf0efdc
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1340-115-0x0000000073F50000-0x0000000073F7E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 856 wrote to memory of 1340 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1340 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1340 856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c367ad39c381c7d56159ed068e73a27bc6b78c20f69959454de3d71029b9a048.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c367ad39c381c7d56159ed068e73a27bc6b78c20f69959454de3d71029b9a048.dll,#12⤵
- Checks whether UAC is enabled
PID:1340