Analysis
-
max time kernel
49s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 12:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
u0eukz.dll
Resource
win7-20230621-en
windows7-x64
5 signatures
150 seconds
General
-
Target
u0eukz.dll
-
Size
453KB
-
MD5
86cdc85c3d58de12bf6e8783d044a105
-
SHA1
b47f3b5529277cf2645ed56e8d1b832c9a065969
-
SHA256
a129f0d21e80d53b7de86f2b6cdc8434f75a4fb98eb87aa43753cb5bbdf561da
-
SHA512
6f392c86ea5c9d3046ad24b31b7246edcffbf6d612555a360d7d409778e3e17611f735cee7f663d949442cf2c8cf6e7b8a6d8e1836c23d281b0f3267664b0502
-
SSDEEP
6144:NoDXt02LN4DpFJZ2aCfTphY+2ou9ZryjYC0ro:CXtnLNuFJZ0nVwysb
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
195.231.69.151:3889
62.138.14.216:3074
46.4.83.131:3389
198.211.118.187:3388
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1768 rundll32.exe 5 1768 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1768 1064 rundll32.exe 28 PID 1064 wrote to memory of 1768 1064 rundll32.exe 28 PID 1064 wrote to memory of 1768 1064 rundll32.exe 28 PID 1064 wrote to memory of 1768 1064 rundll32.exe 28 PID 1064 wrote to memory of 1768 1064 rundll32.exe 28 PID 1064 wrote to memory of 1768 1064 rundll32.exe 28 PID 1064 wrote to memory of 1768 1064 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\u0eukz.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\u0eukz.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1768
-