Analysis
-
max time kernel
24s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-06-2021 11:12
Static task
static1
General
-
Target
1fb752e9020922efced7e0ecec27049a37c49bd8621dddd9f5201e924287e325.dll
-
Size
158KB
-
MD5
49f7719cca31e387c879f210771c07b7
-
SHA1
16c45344639819f7c77b9695ba18940acd05ac28
-
SHA256
1fb752e9020922efced7e0ecec27049a37c49bd8621dddd9f5201e924287e325
-
SHA512
7cd7195bf1ee579866850e0bfa252cc688ae816dfd136ccbdffac10357f486cfda950fac830292d4be9660e306ed0dc77918068ffa8ac4cd5305b89b23476f00
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/860-115-0x0000000073FB0000-0x0000000073FDD000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 632 wrote to memory of 860 632 rundll32.exe rundll32.exe PID 632 wrote to memory of 860 632 rundll32.exe rundll32.exe PID 632 wrote to memory of 860 632 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1fb752e9020922efced7e0ecec27049a37c49bd8621dddd9f5201e924287e325.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1fb752e9020922efced7e0ecec27049a37c49bd8621dddd9f5201e924287e325.dll,#12⤵
- Checks whether UAC is enabled
PID:860
-