Analysis
-
max time kernel
119s -
max time network
138s -
submitted
01-01-1970 00:00
Static task
static1
General
-
Target
3f2957d66b293e7166a08abfb16c14c07f81ef6484e8db8f385e59a1d32bb196.dll
-
Size
1.0MB
-
MD5
760a5ffe86379b3973a9c0e29008fbbc
-
SHA1
1cbece6f0c74199ed4f42fc35e4ce5d70d194106
-
SHA256
3f2957d66b293e7166a08abfb16c14c07f81ef6484e8db8f385e59a1d32bb196
-
SHA512
7c243bd07a675d738b1d83bd6ae405800da9c686f6e7cecdff8ec233670fcfe2c07cde4d554fad1e98747093b3345477eb0c14f0b9e7e44e3e6615763fa23b70
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
192.46.210.220:443
143.244.140.214:808
45.77.0.96:6891
185.56.219.47:8116
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 25 688 rundll32.exe 27 688 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 688 2192 rundll32.exe 68 PID 2192 wrote to memory of 688 2192 rundll32.exe 68 PID 2192 wrote to memory of 688 2192 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f2957d66b293e7166a08abfb16c14c07f81ef6484e8db8f385e59a1d32bb196.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f2957d66b293e7166a08abfb16c14c07f81ef6484e8db8f385e59a1d32bb196.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:688
-