Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 14:41
Behavioral task
behavioral1
Sample
t6yswb.pdf.dll
Resource
win7-20240903-en
General
-
Target
t6yswb.pdf.dll
-
Size
590KB
-
MD5
770df303f86ac191c177035c214589ee
-
SHA1
6cb4229559c3bcc16d33a92f81fef25b1840d750
-
SHA256
ffcd3f21e103ef18413700ee91a9737900ea88fcae1607cffbf4d7f587039504
-
SHA512
e23ccdc09dd516cad89f8a2c0f11fa23e64e1b1fcff63f4e56338d24b35ab33a972e99898b80c6ade51382443a3993c9254ebd349167380a0fc2e97687c4bcd9
-
SSDEEP
6144:lIStqP+19P2yLnafTR93YBgobwN+5AxtyTCjzVm8NsCupaJ0p/:lIS0Gne883YdbY+5QyTE1kpa+V
Malware Config
Extracted
dridex
10555
162.241.44.26:9443
192.232.229.53:4443
77.220.64.34:443
193.90.12.121:3098
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 2500 rundll32.exe 5 2500 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2088 wrote to memory of 2500 2088 rundll32.exe rundll32.exe PID 2088 wrote to memory of 2500 2088 rundll32.exe rundll32.exe PID 2088 wrote to memory of 2500 2088 rundll32.exe rundll32.exe PID 2088 wrote to memory of 2500 2088 rundll32.exe rundll32.exe PID 2088 wrote to memory of 2500 2088 rundll32.exe rundll32.exe PID 2088 wrote to memory of 2500 2088 rundll32.exe rundll32.exe PID 2088 wrote to memory of 2500 2088 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\t6yswb.pdf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\t6yswb.pdf.dll,#12⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2500
-