Analysis
-
max time kernel
18s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-06-2021 03:24
Static task
static1
General
-
Target
0b6be2e09349624bfa722ba5a0a97dfecab36b808087aced361a0b99e6a1a011.dll
-
Size
158KB
-
MD5
e909a42d27d3b2b068662a8353447856
-
SHA1
7f8b2fc8f4d6c5868d009aca3d568e41b88d47cc
-
SHA256
0b6be2e09349624bfa722ba5a0a97dfecab36b808087aced361a0b99e6a1a011
-
SHA512
93948a66b7630798c66e36aa41192e5956579865e6d2b7b5415270a4f64bebcdd059d8ff8153a7f64432453f7f40d4edec992afa92eb8d7362a4a372638a0b24
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2156-115-0x0000000073860000-0x000000007388D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4004 wrote to memory of 2156 4004 rundll32.exe rundll32.exe PID 4004 wrote to memory of 2156 4004 rundll32.exe rundll32.exe PID 4004 wrote to memory of 2156 4004 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b6be2e09349624bfa722ba5a0a97dfecab36b808087aced361a0b99e6a1a011.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b6be2e09349624bfa722ba5a0a97dfecab36b808087aced361a0b99e6a1a011.dll,#12⤵
- Checks whether UAC is enabled
PID:2156