Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 14:03
Static task
static1
General
-
Target
deb17df5c51fdea65b3d342426ab48560633ead10438762c9baec0aebecf2ad4.dll
-
Size
180KB
-
MD5
af32e0c03835e1d21cb9c23dffb94198
-
SHA1
ab7f8557a2d75c313f79ae3f0a4d090d74ba30d1
-
SHA256
deb17df5c51fdea65b3d342426ab48560633ead10438762c9baec0aebecf2ad4
-
SHA512
8d3eb4269b33514442d04b8aabe2ed173f9c6179bccf3bf8ab285ae10236b17d20564f7d5da15390da45d6a29518696f0d071eb9133d36af2048f764ea88d5e8
Malware Config
Extracted
Family
dridex
Botnet
22202
C2
155.138.203.91:443
207.180.220.242:8116
46.101.142.214:6891
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3752-116-0x00000000744E0000-0x000000007450F000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3964 3752 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe 3964 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3964 WerFault.exe Token: SeBackupPrivilege 3964 WerFault.exe Token: SeDebugPrivilege 3964 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1664 wrote to memory of 3752 1664 rundll32.exe rundll32.exe PID 1664 wrote to memory of 3752 1664 rundll32.exe rundll32.exe PID 1664 wrote to memory of 3752 1664 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb17df5c51fdea65b3d342426ab48560633ead10438762c9baec0aebecf2ad4.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb17df5c51fdea65b3d342426ab48560633ead10438762c9baec0aebecf2ad4.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 6203⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken