Analysis
-
max time kernel
160s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-06-2022 16:30
Static task
static1
Behavioral task
behavioral1
Sample
dyh3tb9j.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
dyh3tb9j.dll
-
Size
497KB
-
MD5
ea17e483833d1d1b26babad280b6f7cd
-
SHA1
ffd61dddb0607a6a12e9f58b50185be7998f7e39
-
SHA256
db8945a793ea1bd94eb1aa3e3e14e84da66b3048f4a86e814e6d0f8dd5c8c276
-
SHA512
7d2add1d53aa7d84ef2e223d5ef8b27ff8f7d5847a27407fed5d0d9cffd3a64bc6ebc41b8b6000d92f077ab7908f940963bdbafe6bb817131dc9ce78d3b2f95e
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
178.128.83.165:443
128.199.59.13:8172
110.164.184.226:6516
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 31 1664 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5040 wrote to memory of 1664 5040 rundll32.exe rundll32.exe PID 5040 wrote to memory of 1664 5040 rundll32.exe rundll32.exe PID 5040 wrote to memory of 1664 5040 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dyh3tb9j.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dyh3tb9j.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1664