Analysis
-
max time kernel
130s -
max time network
148s -
submitted
01-01-1970 00:00
Static task
static1
General
-
Target
1ec28071b46311ee8b7ac671edb44624860fc146a6be705559a669782db67a57.dll
-
Size
750KB
-
MD5
c1511f642055625117520beca66d02df
-
SHA1
da181f3f9f22d057dc3bb681e0eb8b85280dec5a
-
SHA256
1ec28071b46311ee8b7ac671edb44624860fc146a6be705559a669782db67a57
-
SHA512
7d9ff9cfd097e3e6a34516154022da08f6523f0838ed46f5f944ec58a49f4c372cdb4ed5793299bd97e43c5819551771e50f637c9ec570680d20d3e957d14b49
Malware Config
Extracted
Family
dridex
Botnet
10555
C2
192.46.210.220:443
143.244.140.214:808
45.77.0.96:6891
185.56.219.47:8116
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 27 4072 rundll32.exe 29 4072 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3584 wrote to memory of 4072 3584 rundll32.exe rundll32.exe PID 3584 wrote to memory of 4072 3584 rundll32.exe rundll32.exe PID 3584 wrote to memory of 4072 3584 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ec28071b46311ee8b7ac671edb44624860fc146a6be705559a669782db67a57.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ec28071b46311ee8b7ac671edb44624860fc146a6be705559a669782db67a57.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:4072
-