Analysis
-
max time kernel
104s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-06-2022 23:44
Static task
static1
Behavioral task
behavioral1
Sample
yxknwc3j1.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
yxknwc3j1.dll
-
Size
778KB
-
MD5
3d74f44ff0228d92a9531b42cdb13925
-
SHA1
7c53791bc2415deeb4a58c61f87b46ee24a5f08a
-
SHA256
713fc72c9fd79cbe6883bf4b9ab30d4a65ce1efac849b18c8a68da13202c5072
-
SHA512
78d7d93fbdb45735d43288122cea050898df01f77b58a11d9fbb3014c5d1ad4959d26c70452692880c8ecf40381dd2d8bb4a2ccca1ac06f1a3f87d5e2d5f09c8
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
193.90.12.20:443
185.181.9.76:5037
175.207.13.56:5353
212.129.24.84:5037
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 43 4376 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4288 wrote to memory of 4376 4288 rundll32.exe rundll32.exe PID 4288 wrote to memory of 4376 4288 rundll32.exe rundll32.exe PID 4288 wrote to memory of 4376 4288 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\yxknwc3j1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\yxknwc3j1.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:4376