Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 20:13
Static task
static1
Behavioral task
behavioral1
Sample
5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe
Resource
win7-20220718-en
windows7-x64
1 signatures
150 seconds
General
-
Target
5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe
-
Size
136KB
-
MD5
0da16fd48afb99a9fed48abff0268e98
-
SHA1
5785c48119e74ba3db8a64ef2bd03f88280c75bf
-
SHA256
5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce
-
SHA512
7d32b0751bcb4e217ee79fbf0d16b93064813c98a6b7c724c0751af9cd2864f923f580319c9e5644d81c28a4e179b2afb0dcaecfffc3abf637da2671ad292b31
Malware Config
Extracted
Family
dridex
C2
64.87.26.17:443
192.241.220.155:1801
142.4.198.252:3389
216.98.148.156:1801
Signatures
-
Processes:
5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exepid process 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exedescription pid process Token: SeRestorePrivilege 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exedescription pid process target process PID 2092 wrote to memory of 1980 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe raserver.exe PID 2092 wrote to memory of 1980 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe raserver.exe PID 2092 wrote to memory of 1980 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe raserver.exe PID 2092 wrote to memory of 1980 2092 5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe raserver.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe"C:\Users\Admin\AppData\Local\Temp\5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\raserver.exeC:\Windows\SysWOW64\raserver.exe "C:\Users\Admin\AppData\Local\Temp\5420eb082520696d2374df7916cdb8ccb9ae1c6add26a330c71fd33d6d8bafce.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1980-133-0x0000000000000000-mapping.dmp
-
memory/1980-134-0x0000000000F30000-0x0000000000F52000-memory.dmpFilesize
136KB
-
memory/1980-135-0x0000000000F30000-0x0000000000F52000-memory.dmpFilesize
136KB
-
memory/1980-136-0x0000000000F30000-0x0000000000F52000-memory.dmpFilesize
136KB
-
memory/1980-137-0x0000000000F30000-0x0000000000F52000-memory.dmpFilesize
136KB
-
memory/1980-138-0x0000000000F30000-0x0000000000F52000-memory.dmpFilesize
136KB
-
memory/1980-139-0x0000000000F30000-0x0000000000F52000-memory.dmpFilesize
136KB
-
memory/1980-140-0x0000000000F30000-0x0000000000F52000-memory.dmpFilesize
136KB
-
memory/1980-145-0x0000000000C20000-0x0000000000C26000-memory.dmpFilesize
24KB
-
memory/2092-130-0x0000000000DD0000-0x0000000000DF2000-memory.dmpFilesize
136KB
-
memory/2092-132-0x00000000007F0000-0x00000000007F6000-memory.dmpFilesize
24KB