Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 15:31
Static task
static1
Behavioral task
behavioral1
Sample
3339b6583d38272cebd9ebfb71b3b0d582111dd144bad01574f6301e66df3249.dll
Resource
win7-20220414-en
General
-
Target
3339b6583d38272cebd9ebfb71b3b0d582111dd144bad01574f6301e66df3249.dll
-
Size
1.6MB
-
MD5
230191db3261029a7a170936d783ed59
-
SHA1
54bf5e9e7d0e84e9eaa9539f109b165df55e72c9
-
SHA256
3339b6583d38272cebd9ebfb71b3b0d582111dd144bad01574f6301e66df3249
-
SHA512
6fac72dd92550dfc29a7c86cc7fb45d49649874908021eab652f308431323191a21c618008cb9c57a47be3cf5e2105f003b7ac142f3029febe100ed83a149d16
Malware Config
Extracted
dridex
10555
77.220.64.55:443
51.254.163.104:1688
165.22.65.75:3388
103.41.110.115:33443
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 9 1980 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2424 wrote to memory of 1980 2424 rundll32.exe rundll32.exe PID 2424 wrote to memory of 1980 2424 rundll32.exe rundll32.exe PID 2424 wrote to memory of 1980 2424 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3339b6583d38272cebd9ebfb71b3b0d582111dd144bad01574f6301e66df3249.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3339b6583d38272cebd9ebfb71b3b0d582111dd144bad01574f6301e66df3249.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1980-130-0x0000000000000000-mapping.dmp
-
memory/1980-131-0x0000000074FB0000-0x0000000074FED000-memory.dmpFilesize
244KB
-
memory/1980-132-0x0000000074FB0000-0x000000007515A000-memory.dmpFilesize
1.7MB
-
memory/1980-134-0x0000000074FB0000-0x000000007515A000-memory.dmpFilesize
1.7MB