Analysis
-
max time kernel
17s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-08-2021 06:16
Static task
static1
General
-
Target
87ce9f05df130265ed1f8944afa54178fc23e45df545ab4893e3f6c800c14937.dll
-
Size
184KB
-
MD5
033abfd8f0ab1310976185c7a83b1ead
-
SHA1
52307e6f8a058b72a7e710f39f27c1a9700f37b1
-
SHA256
87ce9f05df130265ed1f8944afa54178fc23e45df545ab4893e3f6c800c14937
-
SHA512
1253a3250f1483663534f25149fe150ff6382d95edc9696dc37c7cee2f35b216e16c16f4405d5c8cf45025345e16884e3203a31ca24fcaa1d47eb9bfc25c792f
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/520-115-0x0000000074420000-0x0000000074450000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3292 520 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe 3292 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3292 WerFault.exe Token: SeBackupPrivilege 3292 WerFault.exe Token: SeDebugPrivilege 3292 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3212 wrote to memory of 520 3212 rundll32.exe rundll32.exe PID 3212 wrote to memory of 520 3212 rundll32.exe rundll32.exe PID 3212 wrote to memory of 520 3212 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87ce9f05df130265ed1f8944afa54178fc23e45df545ab4893e3f6c800c14937.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87ce9f05df130265ed1f8944afa54178fc23e45df545ab4893e3f6c800c14937.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 6163⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken