Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-04-2022 02:28
Static task
static1
Behavioral task
behavioral1
Sample
pwaah43f.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
pwaah43f.dll
-
Size
453KB
-
MD5
86cdc85c3d58de12bf6e8783d044a105
-
SHA1
b47f3b5529277cf2645ed56e8d1b832c9a065969
-
SHA256
a129f0d21e80d53b7de86f2b6cdc8434f75a4fb98eb87aa43753cb5bbdf561da
-
SHA512
6f392c86ea5c9d3046ad24b31b7246edcffbf6d612555a360d7d409778e3e17611f735cee7f663d949442cf2c8cf6e7b8a6d8e1836c23d281b0f3267664b0502
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
195.231.69.151:3889
62.138.14.216:3074
46.4.83.131:3389
198.211.118.187:3388
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1172 rundll32.exe 4 1172 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 316 wrote to memory of 1172 316 rundll32.exe 28 PID 316 wrote to memory of 1172 316 rundll32.exe 28 PID 316 wrote to memory of 1172 316 rundll32.exe 28 PID 316 wrote to memory of 1172 316 rundll32.exe 28 PID 316 wrote to memory of 1172 316 rundll32.exe 28 PID 316 wrote to memory of 1172 316 rundll32.exe 28 PID 316 wrote to memory of 1172 316 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pwaah43f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pwaah43f.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1172
-