Analysis
-
max time kernel
101s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26-06-2022 05:40
Static task
static1
Behavioral task
behavioral1
Sample
j7i4qif86.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
j7i4qif86.dll
-
Size
1.0MB
-
MD5
b42efe18ad2b37cb24daf1ee27db37dd
-
SHA1
92f63db052ba2e576a538090b12665cb9761dc2d
-
SHA256
f9f2bf64359f28b5c7c261321f5ee1da8207e138ea675287eb027235696649af
-
SHA512
d6f24963529822b49928ae721f71836b849ce64c3ee978e6306cb40c5bea9c23ae844d34c3bbdca3f720badaff547a66ebd71f4fed2ccbfe91dd1521be284cf8
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
192.46.210.220:443
143.244.140.214:808
45.77.0.96:6891
185.56.219.47:8116
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 27 804 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1252 wrote to memory of 804 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 804 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 804 1252 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\j7i4qif86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\j7i4qif86.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:804