Analysis
-
max time kernel
25s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-06-2021 04:25
Static task
static1
General
-
Target
87a4bb7a3cb96a618dc5151d029e5f4a3ddd7d43444d6d37eedec1a4feaa096a.dll
-
Size
158KB
-
MD5
04af60a744998fe0aa9e135564eeec33
-
SHA1
aa94539145748f3b8473120995ae26a9fb8fcb9e
-
SHA256
87a4bb7a3cb96a618dc5151d029e5f4a3ddd7d43444d6d37eedec1a4feaa096a
-
SHA512
36accd28853f50bb5eeedc0f4676615d10d406ca7dd2d235607887a9629359057340590c784482cf1f4422b75df3fb705e18782048e8d5d5fc6a42537667568b
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1212-115-0x0000000073FB0000-0x0000000073FDD000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 632 wrote to memory of 1212 632 rundll32.exe rundll32.exe PID 632 wrote to memory of 1212 632 rundll32.exe rundll32.exe PID 632 wrote to memory of 1212 632 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87a4bb7a3cb96a618dc5151d029e5f4a3ddd7d43444d6d37eedec1a4feaa096a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87a4bb7a3cb96a618dc5151d029e5f4a3ddd7d43444d6d37eedec1a4feaa096a.dll,#12⤵
- Checks whether UAC is enabled
PID:1212