Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-06-2022 16:49
Static task
static1
Behavioral task
behavioral1
Sample
nde67wks.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
nde67wks.dll
-
Size
923KB
-
MD5
b94268ab1032daba281e9d9f4407676f
-
SHA1
36e85ba5240d9f22b6736244637484b5fa129aa3
-
SHA256
0f01fd5896b88ced79f6f611de53a20385c7a5b2f7e443ed58bc5e449e768a29
-
SHA512
e02c87e4a6035444a7ae0e009960e9ccdf9f7c75bb5594a555ae4b25f9b5bfb742df12cb50fa53804ed8f17823126093b262c786c8c2513d694fcffb69f20978
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
146.185.170.249:443
62.75.251.60:6601
185.148.168.25:2303
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 27 2996 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1496 wrote to memory of 2996 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 2996 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 2996 1496 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\nde67wks.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\nde67wks.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2996-130-0x0000000000000000-mapping.dmp
-
memory/2996-131-0x0000000075690000-0x0000000075790000-memory.dmpFilesize
1024KB
-
memory/2996-133-0x0000000075690000-0x0000000075790000-memory.dmpFilesize
1024KB
-
memory/2996-132-0x0000000075690000-0x00000000756CD000-memory.dmpFilesize
244KB
-
memory/2996-135-0x0000000075690000-0x0000000075790000-memory.dmpFilesize
1024KB