Analysis
-
max time kernel
26s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-06-2021 12:40
Static task
static1
General
-
Target
fcce858b8d20725635a90fac35047cd00940e0dc15169ceb279a370b23ca5326.dll
-
Size
160KB
-
MD5
108e229dbab08063b23f7a9b83aae307
-
SHA1
9b16780c556eb14b2d28430ad8e3bfdf7ba0b5f8
-
SHA256
fcce858b8d20725635a90fac35047cd00940e0dc15169ceb279a370b23ca5326
-
SHA512
823378e46e392fcca93154ce75694878f027f3b31e65598e9b3807e6c7e141166eacbdc4a3969ebed9082a106046c27398755d2845db3773420542a41aea7b9d
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1020-115-0x00000000735F0000-0x000000007361E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 604 wrote to memory of 1020 604 rundll32.exe rundll32.exe PID 604 wrote to memory of 1020 604 rundll32.exe rundll32.exe PID 604 wrote to memory of 1020 604 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fcce858b8d20725635a90fac35047cd00940e0dc15169ceb279a370b23ca5326.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fcce858b8d20725635a90fac35047cd00940e0dc15169ceb279a370b23ca5326.dll,#12⤵
- Checks whether UAC is enabled
PID:1020