Analysis
-
max time kernel
86s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 07:04
Static task
static1
General
-
Target
331d55def39d58b50770bb647db0b98ae3d049a11626c7a76e0008ad84fba620.dll
-
Size
608KB
-
MD5
b8b4376c19a5cb6a2fe069441249bcf8
-
SHA1
5b7cbfb91c54484f7af73dd26c16501545086935
-
SHA256
331d55def39d58b50770bb647db0b98ae3d049a11626c7a76e0008ad84fba620
-
SHA512
0ecaa1375328cefe3f7b90d903005227cb67ad7a0a41959c5f55f1d5149caf9ad62efe59ea50b8310d342caa251e5e44fdca0196e9988213c949bf4d8e093bcc
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 27 2796 rundll32.exe 28 2796 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1892 wrote to memory of 2796 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 2796 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 2796 1892 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\331d55def39d58b50770bb647db0b98ae3d049a11626c7a76e0008ad84fba620.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\331d55def39d58b50770bb647db0b98ae3d049a11626c7a76e0008ad84fba620.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2796-115-0x0000000000000000-mapping.dmp
-
memory/2796-116-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/2796-117-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2796-118-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/2796-120-0x0000000003280000-0x0000000003281000-memory.dmpFilesize
4KB
-
memory/2796-121-0x0000000003280000-0x0000000003281000-memory.dmpFilesize
4KB
-
memory/2796-122-0x0000000003280000-0x0000000003281000-memory.dmpFilesize
4KB
-
memory/2796-1024-0x0000000002FF0000-0x0000000002FF1000-memory.dmpFilesize
4KB