Analysis
-
max time kernel
90s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:06
Static task
static1
Behavioral task
behavioral1
Sample
bo2bck.dll
Resource
win7-20220718-en
windows7-x64
5 signatures
150 seconds
General
-
Target
bo2bck.dll
-
Size
373KB
-
MD5
8abd17bb45aaf7ded8caa930b60d38ef
-
SHA1
088e885d29c4ab954b98ee85c361dc4592416a01
-
SHA256
ced88a781a18875bea55ccbf9dcc043cb400bd2c3f35afed8b0a6a2f33290991
-
SHA512
5d6b41cd63b362dcec6b99426492b1b742e50c8544dae70a8088d5d36c9c33712e6404f674ed389dc4f8d8b3567b5913d08b55761456fbdbac4de7413e1b2759
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
210.65.244.179:443
37.247.35.130:6601
103.18.108.116:6601
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 46 3140 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2136 wrote to memory of 3140 2136 rundll32.exe rundll32.exe PID 2136 wrote to memory of 3140 2136 rundll32.exe rundll32.exe PID 2136 wrote to memory of 3140 2136 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bo2bck.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bo2bck.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3140-130-0x0000000000000000-mapping.dmp
-
memory/3140-132-0x0000000075080000-0x000000007513C000-memory.dmpFilesize
752KB
-
memory/3140-131-0x0000000075080000-0x00000000750BD000-memory.dmpFilesize
244KB
-
memory/3140-134-0x0000000075080000-0x000000007513C000-memory.dmpFilesize
752KB
-
memory/3140-135-0x0000000075080000-0x000000007513C000-memory.dmpFilesize
752KB