Analysis
-
max time kernel
18s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-06-2021 15:24
Static task
static1
General
-
Target
870ef3b54ad75be90cf92aabc9ff8e88e9beaa3ff9e48a04dce87d8d8b9f9047.dll
-
Size
160KB
-
MD5
7483a45af0e325e6777e8648bc46991c
-
SHA1
2527751d8c37b6524c6bc938bf77b99b4e8d9d2a
-
SHA256
870ef3b54ad75be90cf92aabc9ff8e88e9beaa3ff9e48a04dce87d8d8b9f9047
-
SHA512
ff58c568d9073cefd36aa9ec96a16d7591799c133ba79f93abdb01e3370cee946661b745a268a8a4a7e816359c4b7022ebdbd1db1602d4e9ddc53ad7b4e1ee76
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3696-115-0x0000000073E80000-0x0000000073EAE000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3368 wrote to memory of 3696 3368 rundll32.exe rundll32.exe PID 3368 wrote to memory of 3696 3368 rundll32.exe rundll32.exe PID 3368 wrote to memory of 3696 3368 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\870ef3b54ad75be90cf92aabc9ff8e88e9beaa3ff9e48a04dce87d8d8b9f9047.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\870ef3b54ad75be90cf92aabc9ff8e88e9beaa3ff9e48a04dce87d8d8b9f9047.dll,#12⤵
- Checks whether UAC is enabled
PID:3696