Analysis
-
max time kernel
132s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
06-12-2021 14:13
Static task
static1
Behavioral task
behavioral1
Sample
be5c2a86e8203b713825079b800b6d7c.dll
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
General
-
Target
be5c2a86e8203b713825079b800b6d7c.dll
-
Size
476KB
-
MD5
be5c2a86e8203b713825079b800b6d7c
-
SHA1
3394ed014d307d5e8258bcac2dc7136900f42b66
-
SHA256
e023351c103b63084b21d7d0051001caab0643fc7b39f2a5b168c5e923af6430
-
SHA512
f599d4d00e3bc84dd103809acf93428b9568abe85a9ca106e34f112bbf9b012bf9355ee47e395187afbb0145ff2480acd472597bee6f3856ee744b7f22a7d6ad
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
23.246.204.126:443
151.106.39.36:8116
103.124.144.123:6891
172.105.78.60:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/1136-57-0x0000000075050000-0x00000000750C9000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 276 1136 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 276 WerFault.exe 276 WerFault.exe 276 WerFault.exe 276 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 276 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 276 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 572 wrote to memory of 1136 572 rundll32.exe 28 PID 572 wrote to memory of 1136 572 rundll32.exe 28 PID 572 wrote to memory of 1136 572 rundll32.exe 28 PID 572 wrote to memory of 1136 572 rundll32.exe 28 PID 572 wrote to memory of 1136 572 rundll32.exe 28 PID 572 wrote to memory of 1136 572 rundll32.exe 28 PID 572 wrote to memory of 1136 572 rundll32.exe 28 PID 1136 wrote to memory of 276 1136 rundll32.exe 29 PID 1136 wrote to memory of 276 1136 rundll32.exe 29 PID 1136 wrote to memory of 276 1136 rundll32.exe 29 PID 1136 wrote to memory of 276 1136 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be5c2a86e8203b713825079b800b6d7c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be5c2a86e8203b713825079b800b6d7c.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 3443⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-