Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 12:06
Static task
static1
Behavioral task
behavioral1
Sample
6dacd8ef01147243d9e5e25448399850N.dll
Resource
win7-20240704-en
General
-
Target
6dacd8ef01147243d9e5e25448399850N.dll
-
Size
660KB
-
MD5
6dacd8ef01147243d9e5e25448399850
-
SHA1
c10987e8fc9fa1046bf2b7fdc04fb3c0191752af
-
SHA256
7d1b7fe90a9523e9fb69375b953ccac25846900acf630b8b1325019d07852224
-
SHA512
8ace3c7c0ce32a71feac49aacdc6e26375ab577b5a119b9b5e68b74ec90befecfbe1bf013fb578b5bede30986145df7ba1d4e71222b5227baa27055d7c13fa81
-
SSDEEP
6144:ebazNBbycfmKsyUlVyMdUFIk1KyHNwoA9pFp5xMqC1hxUxR3KulSsKz3+m:FzeTlVy/7HNWp5WqUhxUxR3KuksKam
Malware Config
Extracted
dridex
10444
210.65.244.176:443
37.34.58.210:6601
77.220.64.141:5037
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2468 2456 regsvr32.exe 30 PID 2456 wrote to memory of 2468 2456 regsvr32.exe 30 PID 2456 wrote to memory of 2468 2456 regsvr32.exe 30 PID 2456 wrote to memory of 2468 2456 regsvr32.exe 30 PID 2456 wrote to memory of 2468 2456 regsvr32.exe 30 PID 2456 wrote to memory of 2468 2456 regsvr32.exe 30 PID 2456 wrote to memory of 2468 2456 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6dacd8ef01147243d9e5e25448399850N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6dacd8ef01147243d9e5e25448399850N.dll2⤵
- System Location Discovery: System Language Discovery
PID:2468
-