Analysis
-
max time kernel
141s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 14:41
Behavioral task
behavioral1
Sample
t6yswb.pdf.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
t6yswb.pdf.dll
-
Size
590KB
-
MD5
770df303f86ac191c177035c214589ee
-
SHA1
6cb4229559c3bcc16d33a92f81fef25b1840d750
-
SHA256
ffcd3f21e103ef18413700ee91a9737900ea88fcae1607cffbf4d7f587039504
-
SHA512
e23ccdc09dd516cad89f8a2c0f11fa23e64e1b1fcff63f4e56338d24b35ab33a972e99898b80c6ade51382443a3993c9254ebd349167380a0fc2e97687c4bcd9
-
SSDEEP
6144:lIStqP+19P2yLnafTR93YBgobwN+5AxtyTCjzVm8NsCupaJ0p/:lIS0Gne883YdbY+5QyTE1kpa+V
Malware Config
Extracted
Family
dridex
Botnet
10555
C2
162.241.44.26:9443
192.232.229.53:4443
77.220.64.34:443
193.90.12.121:3098
rc4.plain
rc4.plain
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4580 wrote to memory of 4572 4580 rundll32.exe rundll32.exe PID 4580 wrote to memory of 4572 4580 rundll32.exe rundll32.exe PID 4580 wrote to memory of 4572 4580 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\t6yswb.pdf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\t6yswb.pdf.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4572
-