Analysis
-
max time kernel
111s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 19:07
Static task
static1
Behavioral task
behavioral1
Sample
2_api-ms-win-downlevel-normaliz-l1-1-0.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
2_api-ms-win-downlevel-normaliz-l1-1-0.dll
-
Size
180KB
-
MD5
00752a06db0eacfd3b09e36d3a3d29c6
-
SHA1
9afd6ace7a8b25a58450cf7ec16db38a480c32dc
-
SHA256
e8291c194029eedc2117c099b3089a252dfb940160530409df4b9ea85efc9033
-
SHA512
1895a988c678e30ceac1afb421dc29fc6531617b0a5497ec50ae90b2cf85bf62724ad830576e9394cecd6f334f864fa6630a763671b30a91dfe0aa052315ebfe
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
212.237.17.99:443
176.28.17.160:6602
51.254.140.238:8333
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2348-116-0x00000000737D0000-0x00000000737FF000-memory.dmp dridex_ldr -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3932 2348 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3932 WerFault.exe Token: SeBackupPrivilege 3932 WerFault.exe Token: SeDebugPrivilege 3932 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2272 wrote to memory of 2348 2272 rundll32.exe rundll32.exe PID 2272 wrote to memory of 2348 2272 rundll32.exe rundll32.exe PID 2272 wrote to memory of 2348 2272 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2_api-ms-win-downlevel-normaliz-l1-1-0.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2_api-ms-win-downlevel-normaliz-l1-1-0.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 6243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken