Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 07:04
Static task
static1
General
-
Target
4f2ac8c6a5eec50e093c9fe14e2597b691a6a0eda9867e17cd2fa17aba1e8a75.dll
-
Size
608KB
-
MD5
e413f3a91ad86c1d165b54ada721c5ab
-
SHA1
55ef7747b281eb556b72d7c75619884dba01a51c
-
SHA256
4f2ac8c6a5eec50e093c9fe14e2597b691a6a0eda9867e17cd2fa17aba1e8a75
-
SHA512
003187ad0039284c43451db8c538da5974b6e4e950eb136ad4bc5ff78edf9cc1ad9700aa6f259f5d760b6db3183ceabb89082a10f2a0e101358a78fc67873d39
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 23 3484 rundll32.exe 25 3484 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2016 wrote to memory of 3484 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 3484 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 3484 2016 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f2ac8c6a5eec50e093c9fe14e2597b691a6a0eda9867e17cd2fa17aba1e8a75.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f2ac8c6a5eec50e093c9fe14e2597b691a6a0eda9867e17cd2fa17aba1e8a75.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3484-115-0x0000000000000000-mapping.dmp
-
memory/3484-116-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/3484-118-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/3484-117-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3484-120-0x00000000032D0000-0x00000000032D1000-memory.dmpFilesize
4KB
-
memory/3484-121-0x00000000032D0000-0x00000000032D1000-memory.dmpFilesize
4KB
-
memory/3484-122-0x00000000032D0000-0x00000000032D1000-memory.dmpFilesize
4KB
-
memory/3484-192-0x00000000032C0000-0x00000000032C1000-memory.dmpFilesize
4KB