Analysis
-
max time kernel
4294181s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
11-04-2022 03:24
Static task
static1
Behavioral task
behavioral1
Sample
pwaah43f.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
pwaah43f.dll
-
Size
453KB
-
MD5
86cdc85c3d58de12bf6e8783d044a105
-
SHA1
b47f3b5529277cf2645ed56e8d1b832c9a065969
-
SHA256
a129f0d21e80d53b7de86f2b6cdc8434f75a4fb98eb87aa43753cb5bbdf561da
-
SHA512
6f392c86ea5c9d3046ad24b31b7246edcffbf6d612555a360d7d409778e3e17611f735cee7f663d949442cf2c8cf6e7b8a6d8e1836c23d281b0f3267664b0502
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
195.231.69.151:3889
62.138.14.216:3074
46.4.83.131:3389
198.211.118.187:3388
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1492 rundll32.exe 5 1492 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1492 1328 rundll32.exe 27 PID 1328 wrote to memory of 1492 1328 rundll32.exe 27 PID 1328 wrote to memory of 1492 1328 rundll32.exe 27 PID 1328 wrote to memory of 1492 1328 rundll32.exe 27 PID 1328 wrote to memory of 1492 1328 rundll32.exe 27 PID 1328 wrote to memory of 1492 1328 rundll32.exe 27 PID 1328 wrote to memory of 1492 1328 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pwaah43f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pwaah43f.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1492
-