Analysis
-
max time kernel
137s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 11:55
Static task
static1
Behavioral task
behavioral1
Sample
1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe
-
Size
204KB
-
MD5
7b05245ad87cc1fdb3aafcaa5908cbe0
-
SHA1
b535839cf587059f0d6cd51894d51a5d13e7fb58
-
SHA256
1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7
-
SHA512
b0530ce4c28e438b4eff64a432cbecf12b025ae56876fcb6d7255067ea81a3826a647c1794ed7ea53b7c2175012b8a73c44adb769aaf4b7834eed8e66917ddc9
Malware Config
Extracted
Family
dridex
C2
5.196.15.119:443
46.105.131.72:443
157.7.163.144:3389
199.119.78.9:4143
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exepid process 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exedescription pid process Token: SeRestorePrivilege 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exedescription pid process target process PID 1532 wrote to memory of 4172 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe raserver.exe PID 1532 wrote to memory of 4172 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe raserver.exe PID 1532 wrote to memory of 4172 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe raserver.exe PID 1532 wrote to memory of 4172 1532 1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe raserver.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe"C:\Users\Admin\AppData\Local\Temp\1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\raserver.exeC:\Windows\SysWOW64\raserver.exe "C:\Users\Admin\AppData\Local\Temp\1094af6f51b798e323993b0e6c543a10e04030c648e7507982d90e11edec6af7.exe"2⤵PID:4172