Analysis
-
max time kernel
27s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-06-2021 02:55
Static task
static1
General
-
Target
f954d599db0a316ed66c09f95da8e72ec66fa2cdf4f60844247e5611dd020e34.dll
-
Size
160KB
-
MD5
da2d798d699480c62c7451eb2a3d9924
-
SHA1
094445e588d8b60b248078fe6c86532c733ceef0
-
SHA256
f954d599db0a316ed66c09f95da8e72ec66fa2cdf4f60844247e5611dd020e34
-
SHA512
382af7be11af3cc723eedb0605d664b2f1cd234efae6d6b26bec6b5219b18a3c494ba532536b8d6060253cf6c508e959534a2fae94123aa2de91dd7e82925881
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3884-115-0x0000000073560000-0x000000007358E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3492 wrote to memory of 3884 3492 rundll32.exe rundll32.exe PID 3492 wrote to memory of 3884 3492 rundll32.exe rundll32.exe PID 3492 wrote to memory of 3884 3492 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f954d599db0a316ed66c09f95da8e72ec66fa2cdf4f60844247e5611dd020e34.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f954d599db0a316ed66c09f95da8e72ec66fa2cdf4f60844247e5611dd020e34.dll,#12⤵
- Checks whether UAC is enabled
PID:3884