Analysis
-
max time kernel
19s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
29-06-2021 16:08
Static task
static1
General
-
Target
7160909ee47f610348c7296d6a3d77f2974c76fb036be1dc71413ed00ebccdcf.dll
-
Size
158KB
-
MD5
cbf0ad1de573e6889d341d17f8ada868
-
SHA1
7ea5331d8d2de6a0fe1148b1999f1ebd8a7b3392
-
SHA256
7160909ee47f610348c7296d6a3d77f2974c76fb036be1dc71413ed00ebccdcf
-
SHA512
57631b31ea353388a41cf3eaa96444b7a1f86502bde4ed5da79f67d8eedb2bfbe4e2c58ae9a355e1a26575e8d0ff87b8d311d7c208bbe52f7fb04b53629fcd28
Malware Config
Extracted
Family
dridex
Botnet
40111
C2
8.210.53.215:443
72.249.22.245:2303
188.40.137.206:8172
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/4076-115-0x00000000735E0000-0x000000007360D000-memory.dmp dridex_ldr -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3980 wrote to memory of 4076 3980 rundll32.exe rundll32.exe PID 3980 wrote to memory of 4076 3980 rundll32.exe rundll32.exe PID 3980 wrote to memory of 4076 3980 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7160909ee47f610348c7296d6a3d77f2974c76fb036be1dc71413ed00ebccdcf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7160909ee47f610348c7296d6a3d77f2974c76fb036be1dc71413ed00ebccdcf.dll,#12⤵
- Checks whether UAC is enabled
PID:4076
-