Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 14:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
se12y5vmexe.dll
Resource
win7-20230621-en
windows7-x64
5 signatures
150 seconds
General
-
Target
se12y5vmexe.dll
-
Size
311KB
-
MD5
7750ba949e4b090260827a4d8be63efc
-
SHA1
ee0e268bfa0e49591dcf77f32d7da94515d03c82
-
SHA256
8521e047f78ccf64777d40e44fb86a95f900e0ed594bb4f01cc6802ff412c536
-
SHA512
464c3ac243bb8b3bad6419d10d5c9112dbb658e13256b722325bb42bcb11c464192683cb814568ecb431bf28aa3b58cbd7061f8c273b5ee3ac700948876eb315
-
SSDEEP
6144:WH9O040SSrnmrwc4oU2FmrEaoGAC+Y5H2V3B918juwN:i9O02Srnh0qEJC+Y218jdN
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
77.220.64.37:443
80.86.91.27:3308
5.100.228.233:3389
46.105.131.65:1512
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 800 rundll32.exe 4 800 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1700 wrote to memory of 800 1700 rundll32.exe 27 PID 1700 wrote to memory of 800 1700 rundll32.exe 27 PID 1700 wrote to memory of 800 1700 rundll32.exe 27 PID 1700 wrote to memory of 800 1700 rundll32.exe 27 PID 1700 wrote to memory of 800 1700 rundll32.exe 27 PID 1700 wrote to memory of 800 1700 rundll32.exe 27 PID 1700 wrote to memory of 800 1700 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\se12y5vmexe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\se12y5vmexe.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:800
-