Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-06-2022 05:49
Static task
static1
Behavioral task
behavioral1
Sample
no61soo9m.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
no61soo9m.dll
-
Size
453KB
-
MD5
86cdc85c3d58de12bf6e8783d044a105
-
SHA1
b47f3b5529277cf2645ed56e8d1b832c9a065969
-
SHA256
a129f0d21e80d53b7de86f2b6cdc8434f75a4fb98eb87aa43753cb5bbdf561da
-
SHA512
6f392c86ea5c9d3046ad24b31b7246edcffbf6d612555a360d7d409778e3e17611f735cee7f663d949442cf2c8cf6e7b8a6d8e1836c23d281b0f3267664b0502
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
195.231.69.151:3889
62.138.14.216:3074
46.4.83.131:3389
198.211.118.187:3388
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 860 rundll32.exe 4 860 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1784 wrote to memory of 860 1784 rundll32.exe 27 PID 1784 wrote to memory of 860 1784 rundll32.exe 27 PID 1784 wrote to memory of 860 1784 rundll32.exe 27 PID 1784 wrote to memory of 860 1784 rundll32.exe 27 PID 1784 wrote to memory of 860 1784 rundll32.exe 27 PID 1784 wrote to memory of 860 1784 rundll32.exe 27 PID 1784 wrote to memory of 860 1784 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\no61soo9m.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\no61soo9m.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:860
-