Analysis
-
max time kernel
19s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
28-06-2021 13:27
Static task
static1
General
-
Target
9bb347b003a70308272a4153be33c1e1656811ed7f7d9f4d713e37a7e39f98e4.dll
-
Size
160KB
-
MD5
e43c6b47e3ef8c4727aaf2ecd3f108da
-
SHA1
22e98f51155032a122dba44c898371a3e6fa6f2f
-
SHA256
9bb347b003a70308272a4153be33c1e1656811ed7f7d9f4d713e37a7e39f98e4
-
SHA512
f5f5feca34f827f8ba9be49d1d596916c7fee5939a458ff34f5a5ddc4567854adb1a73c5c25b674c568eb39a9dda4437f0843d15fc88d08cde9fc6cef3ed7b6b
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
94.247.168.64:443
159.203.93.122:8172
50.116.27.97:2303
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/4092-115-0x00000000735E0000-0x000000007360E000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3980 wrote to memory of 4092 3980 rundll32.exe rundll32.exe PID 3980 wrote to memory of 4092 3980 rundll32.exe rundll32.exe PID 3980 wrote to memory of 4092 3980 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9bb347b003a70308272a4153be33c1e1656811ed7f7d9f4d713e37a7e39f98e4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9bb347b003a70308272a4153be33c1e1656811ed7f7d9f4d713e37a7e39f98e4.dll,#12⤵
- Checks whether UAC is enabled
PID:4092
-