Analysis
-
max time kernel
168s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26-06-2022 05:35
Static task
static1
Behavioral task
behavioral1
Sample
gyzkwsmw6.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
gyzkwsmw6.dll
-
Size
381KB
-
MD5
0a93401ba77815b37c6301abdd7dc528
-
SHA1
23c162713424774e2c90a4468a12197c20df14b3
-
SHA256
51fc19f8dd98ece514232b2db2f5fa918f279ec2209597d0c9a6f95ea9311663
-
SHA512
6f6dd223d248eda6ae9dbb2f1024d750e73844315efb2cc6c52ba216c7dcded3c6d394787b6e10494edb9cf85af1b540120700e231ded808b6a473ea708bafb3
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
131.100.24.215:443
210.65.244.174:6601
195.201.199.53:2303
rc4.plain
rc4.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 18 1348 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1888 wrote to memory of 1348 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1348 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1348 1888 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gyzkwsmw6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gyzkwsmw6.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:1348