Analysis
-
max time kernel
19s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-06-2021 16:02
Static task
static1
General
-
Target
90e126524c3f69a319f5f3d96554abbfc2a810c9fec44a4e16300a1f9c7ee84d.dll
-
Size
160KB
-
MD5
f77d11c689ed44d0bdcfb3c4a30cda24
-
SHA1
4c936873d0193de7d5f1938d1931579249b2b2b6
-
SHA256
90e126524c3f69a319f5f3d96554abbfc2a810c9fec44a4e16300a1f9c7ee84d
-
SHA512
29cf675b954a82087e9209ce733a95e5d294e6e00dd470d7161e7e0c63b18ab1ac6b99398694b8de836ae9e5444f194e64b54600ca384944cff7bd93a6b48985
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/796-115-0x00000000742B0000-0x00000000742DE000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3156 wrote to memory of 796 3156 rundll32.exe rundll32.exe PID 3156 wrote to memory of 796 3156 rundll32.exe rundll32.exe PID 3156 wrote to memory of 796 3156 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90e126524c3f69a319f5f3d96554abbfc2a810c9fec44a4e16300a1f9c7ee84d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90e126524c3f69a319f5f3d96554abbfc2a810c9fec44a4e16300a1f9c7ee84d.dll,#12⤵
- Checks whether UAC is enabled
PID:796