Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 19:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
82d302afe9d2736961bb168f32041fee.dll
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
82d302afe9d2736961bb168f32041fee.dll
-
Size
620KB
-
MD5
82d302afe9d2736961bb168f32041fee
-
SHA1
0cb3ec7d2e47467ec0a0e493c54370e4887c9a07
-
SHA256
94d5b3d610ee219d7c02c07ff7c80a5059359fb16b49284f02749e34097dcb0a
-
SHA512
818a2d59cb42e2140cebd31c44b4ace31621091712c42eb404ed920cc84e91c2884e68409d9b4d2d1213d0d49cb3aad9503a5081ec8c6b42ee1f80af32cb2d30
-
SSDEEP
12288:pE6rSi44cbs3j09TMmonCh5atbz9+eoQoUZpDd7Da1nX9y1PO/zFZx:3emh3j0dMZnCutz4zI5xDwXUhm
Malware Config
Extracted
Family
dridex
Botnet
10222
C2
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 1248 rundll32.exe 5 1248 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1212 wrote to memory of 1248 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 1248 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 1248 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 1248 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 1248 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 1248 1212 rundll32.exe rundll32.exe PID 1212 wrote to memory of 1248 1212 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82d302afe9d2736961bb168f32041fee.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82d302afe9d2736961bb168f32041fee.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1248
-