Analysis
-
max time kernel
101s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 07:03
Static task
static1
General
-
Target
da653d1624cbe59458f48f8048c45f507091755a8a733cec579f53a99fbd68af.dll
-
Size
608KB
-
MD5
7ca72fc4a285f895d128f16491333e0e
-
SHA1
01c1d26d6ee088ab1466daa694e54671a4543cc0
-
SHA256
da653d1624cbe59458f48f8048c45f507091755a8a733cec579f53a99fbd68af
-
SHA512
eca5d8a49cb66dc3c7ed2d291d316d92fc8cd781a8870624ab5ea7cf24f279efc4e79868292e7424d9e0a35a340ab59bf74c23731afe33823d4c8f8b5baea678
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 36 3816 rundll32.exe 37 3816 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2132 wrote to memory of 3816 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 3816 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 3816 2132 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da653d1624cbe59458f48f8048c45f507091755a8a733cec579f53a99fbd68af.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da653d1624cbe59458f48f8048c45f507091755a8a733cec579f53a99fbd68af.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3816-115-0x0000000000000000-mapping.dmp
-
memory/3816-116-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/3816-117-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3816-118-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/3816-120-0x00000000030E0000-0x000000000322A000-memory.dmpFilesize
1.3MB
-
memory/3816-122-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB
-
memory/3816-121-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB
-
memory/3816-123-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB