Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 10:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d7b5a19cb7ce9d10661a0b61ab0722e.dll
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
0d7b5a19cb7ce9d10661a0b61ab0722e.dll
-
Size
608KB
-
MD5
0d7b5a19cb7ce9d10661a0b61ab0722e
-
SHA1
e6a298b811b71269579bd63af77650ee4c9728bc
-
SHA256
d34289f82d47d757bf7f5eec58f2a138983c0f41e450fff56c64dc3ab3bb2b25
-
SHA512
3fc8667211ae1cf85deb6889b0eded4c4cfe417e19ff7a17561909b8e0b257f63e9de84eb9a34f786d1542279d2ec69c6f17e12e02f912f02a0ef57c777d57c2
-
SSDEEP
12288:KZGQdqOG2VJqydLqQSeCqsVK8kPRGO35N9mVNzXc6:KZ0OWjeCVVK8kP9N9oR
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2672 rundll32.exe 5 2672 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2672 1760 rundll32.exe 28 PID 1760 wrote to memory of 2672 1760 rundll32.exe 28 PID 1760 wrote to memory of 2672 1760 rundll32.exe 28 PID 1760 wrote to memory of 2672 1760 rundll32.exe 28 PID 1760 wrote to memory of 2672 1760 rundll32.exe 28 PID 1760 wrote to memory of 2672 1760 rundll32.exe 28 PID 1760 wrote to memory of 2672 1760 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d7b5a19cb7ce9d10661a0b61ab0722e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d7b5a19cb7ce9d10661a0b61ab0722e.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:2672
-