Analysis

  • max time kernel
    20s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    21-07-2021 18:12

General

  • Target

    2c54438f5d99d15e5df3965397e25a0fa17ca7f08d317eb4bf31d1268e10f020.dll

  • Size

    176KB

  • MD5

    397b799c357562c5a8061a39514d7785

  • SHA1

    80d3d5366f47d3462ea9e688f444066d7fce2a24

  • SHA256

    2c54438f5d99d15e5df3965397e25a0fa17ca7f08d317eb4bf31d1268e10f020

  • SHA512

    bbec10e5d321ee33184cb2b450296103333196e0d9b71c7066bdf6ef5ea011210f6c28ada19532cff1ad22df577e7b40a39b2fa1adabb525b91a1b19e097f70b

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

178.238.236.59:443

104.245.52.73:5007

81.0.236.93:13786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2c54438f5d99d15e5df3965397e25a0fa17ca7f08d317eb4bf31d1268e10f020.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:500
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2c54438f5d99d15e5df3965397e25a0fa17ca7f08d317eb4bf31d1268e10f020.dll,#1
      2⤵
        PID:3680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 636
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2696

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3680-114-0x0000000000000000-mapping.dmp

    • memory/3680-115-0x00000000742F0000-0x0000000074321000-memory.dmp

      Filesize

      196KB

    • memory/3680-117-0x00000000010F0000-0x00000000010F6000-memory.dmp

      Filesize

      24KB