Analysis
-
max time kernel
151s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
19-04-2021 14:24
Static task
static1
Behavioral task
behavioral1
Sample
dridex_main_500545c9760bd316dd59f99cfcc62532ffa929d62e0fdb062ab096f828ab31bc.bin.dll
Resource
win7v20210408
General
-
Target
dridex_main_500545c9760bd316dd59f99cfcc62532ffa929d62e0fdb062ab096f828ab31bc.bin.dll
-
Size
604KB
-
MD5
82f65be4ff7e40974bea265c524ddfd9
-
SHA1
b044b52058c3cde173a06811262913c31f0af3e1
-
SHA256
500545c9760bd316dd59f99cfcc62532ffa929d62e0fdb062ab096f828ab31bc
-
SHA512
b0b6e9cb0192f78f42ec6da160a0e070d4b2c6e83f309b6267697f75dd9c484cbaa95ac76ec656d457801482e3372d4cdfdb80260a77dba31aa9ade58de1784c
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1100-60-0x000007FEF69C0000-0x000007FEF6A61000-memory.dmp dridex_ldr behavioral1/memory/1352-68-0x0000000140000000-0x00000001400A1000-memory.dmp dridex_ldr behavioral1/memory/856-80-0x000007FEF6D90000-0x000007FEF6E32000-memory.dmp dridex_ldr behavioral1/memory/748-89-0x000007FEF6C60000-0x000007FEF6D02000-memory.dmp dridex_ldr -
Executes dropped EXE 3 IoCs
Processes:
TpmInit.exeSystemPropertiesComputerName.exenotepad.exepid process 856 TpmInit.exe 748 SystemPropertiesComputerName.exe 612 notepad.exe -
Loads dropped DLL 7 IoCs
Processes:
TpmInit.exeSystemPropertiesComputerName.exenotepad.exepid process 1352 856 TpmInit.exe 1352 748 SystemPropertiesComputerName.exe 1352 612 notepad.exe 1352 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Axiifu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\fxaSh\\SystemPropertiesComputerName.exe" -
Processes:
notepad.exerundll32.exeTpmInit.exeSystemPropertiesComputerName.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TpmInit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeTpmInit.exeSystemPropertiesComputerName.exepid process 1100 rundll32.exe 1100 rundll32.exe 1100 rundll32.exe 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 856 TpmInit.exe 856 TpmInit.exe 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 748 SystemPropertiesComputerName.exe 748 SystemPropertiesComputerName.exe 1352 1352 1352 1352 1352 1352 1352 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1352 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1352 1352 1352 1352 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1352 1352 1352 1352 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1352 wrote to memory of 1264 1352 TpmInit.exe PID 1352 wrote to memory of 1264 1352 TpmInit.exe PID 1352 wrote to memory of 1264 1352 TpmInit.exe PID 1352 wrote to memory of 856 1352 TpmInit.exe PID 1352 wrote to memory of 856 1352 TpmInit.exe PID 1352 wrote to memory of 856 1352 TpmInit.exe PID 1352 wrote to memory of 576 1352 SystemPropertiesComputerName.exe PID 1352 wrote to memory of 576 1352 SystemPropertiesComputerName.exe PID 1352 wrote to memory of 576 1352 SystemPropertiesComputerName.exe PID 1352 wrote to memory of 748 1352 SystemPropertiesComputerName.exe PID 1352 wrote to memory of 748 1352 SystemPropertiesComputerName.exe PID 1352 wrote to memory of 748 1352 SystemPropertiesComputerName.exe PID 1352 wrote to memory of 800 1352 notepad.exe PID 1352 wrote to memory of 800 1352 notepad.exe PID 1352 wrote to memory of 800 1352 notepad.exe PID 1352 wrote to memory of 612 1352 notepad.exe PID 1352 wrote to memory of 612 1352 notepad.exe PID 1352 wrote to memory of 612 1352 notepad.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dridex_main_500545c9760bd316dd59f99cfcc62532ffa929d62e0fdb062ab096f828ab31bc.bin.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵
-
C:\Users\Admin\AppData\Local\m5D52\TpmInit.exeC:\Users\Admin\AppData\Local\m5D52\TpmInit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵
-
C:\Users\Admin\AppData\Local\CPfdGW\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\CPfdGW\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵
-
C:\Users\Admin\AppData\Local\vWD10n\notepad.exeC:\Users\Admin\AppData\Local\vWD10n\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\CPfdGW\SYSDM.CPLMD5
16da2a4b2738849968cc06ff87e32459
SHA1e68d544f2e2bac09775aa3a02b3e3b2fa94693ee
SHA2568b03df1d7c2201c66deae756be448307c7b73044ee140d89030b813ed1ca290a
SHA51224ffea2721b40a7fefa59a1d0a84a5985beae70a6e670ef98adc8d627efac0ab27be23786d8a23582baefda8c893ed08f31392f38c572689866c7a4bcc2af637
-
C:\Users\Admin\AppData\Local\CPfdGW\SystemPropertiesComputerName.exeMD5
bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026
-
C:\Users\Admin\AppData\Local\m5D52\ACTIVEDS.dllMD5
aef1ea92d0622d390ad850f7b809583d
SHA173d0081bf5d4ceafef5f39a4865cc1b1542d6188
SHA25636d2aed62471f5909b7df083cdfdfeb33491461d56d8b3d146da7eb56d71889b
SHA5125c5006c57a5a0258837e98f864e63b1131e25c7947be35cb448c95fbd1f3a716a7e1b3b0d83fc332571250b29391965df8b1699393b4315ad9500b456d4428a2
-
C:\Users\Admin\AppData\Local\m5D52\TpmInit.exeMD5
8b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d
-
C:\Users\Admin\AppData\Local\vWD10n\VERSION.dllMD5
c0099cc6fa0da919a6bea929009d85de
SHA1632b0db03d02c8f75ed451318831098270ff8b16
SHA25609f9bfd368ced9074557a4947b8ab2becef4f0fd59e4fe4afa59aba9c5815c68
SHA512f7c058568a3549d7649e185a56f26edda6a8cf447f60d13300078c5de9ff097a112e0d301c5fcbf9c42951a619c2b5b669c14d12624d26e8b76d4dc4c1216745
-
C:\Users\Admin\AppData\Local\vWD10n\notepad.exeMD5
f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
\Users\Admin\AppData\Local\CPfdGW\SYSDM.CPLMD5
16da2a4b2738849968cc06ff87e32459
SHA1e68d544f2e2bac09775aa3a02b3e3b2fa94693ee
SHA2568b03df1d7c2201c66deae756be448307c7b73044ee140d89030b813ed1ca290a
SHA51224ffea2721b40a7fefa59a1d0a84a5985beae70a6e670ef98adc8d627efac0ab27be23786d8a23582baefda8c893ed08f31392f38c572689866c7a4bcc2af637
-
\Users\Admin\AppData\Local\CPfdGW\SystemPropertiesComputerName.exeMD5
bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026
-
\Users\Admin\AppData\Local\m5D52\ACTIVEDS.dllMD5
aef1ea92d0622d390ad850f7b809583d
SHA173d0081bf5d4ceafef5f39a4865cc1b1542d6188
SHA25636d2aed62471f5909b7df083cdfdfeb33491461d56d8b3d146da7eb56d71889b
SHA5125c5006c57a5a0258837e98f864e63b1131e25c7947be35cb448c95fbd1f3a716a7e1b3b0d83fc332571250b29391965df8b1699393b4315ad9500b456d4428a2
-
\Users\Admin\AppData\Local\m5D52\TpmInit.exeMD5
8b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d
-
\Users\Admin\AppData\Local\vWD10n\VERSION.dllMD5
c0099cc6fa0da919a6bea929009d85de
SHA1632b0db03d02c8f75ed451318831098270ff8b16
SHA25609f9bfd368ced9074557a4947b8ab2becef4f0fd59e4fe4afa59aba9c5815c68
SHA512f7c058568a3549d7649e185a56f26edda6a8cf447f60d13300078c5de9ff097a112e0d301c5fcbf9c42951a619c2b5b669c14d12624d26e8b76d4dc4c1216745
-
\Users\Admin\AppData\Local\vWD10n\notepad.exeMD5
f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\OaHMGMUUNL\notepad.exeMD5
f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
memory/612-93-0x0000000000000000-mapping.dmp
-
memory/748-84-0x0000000000000000-mapping.dmp
-
memory/748-89-0x000007FEF6C60000-0x000007FEF6D02000-memory.dmpFilesize
648KB
-
memory/856-75-0x0000000000000000-mapping.dmp
-
memory/856-77-0x000007FEFC1D1000-0x000007FEFC1D3000-memory.dmpFilesize
8KB
-
memory/856-80-0x000007FEF6D90000-0x000007FEF6E32000-memory.dmpFilesize
648KB
-
memory/1100-62-0x00000000000B0000-0x00000000000B7000-memory.dmpFilesize
28KB
-
memory/1100-60-0x000007FEF69C0000-0x000007FEF6A61000-memory.dmpFilesize
644KB
-
memory/1352-67-0x0000000140000000-0x00000001400A1000-memory.dmpFilesize
644KB
-
memory/1352-63-0x0000000003A10000-0x0000000003A11000-memory.dmpFilesize
4KB
-
memory/1352-65-0x0000000140000000-0x00000001400A1000-memory.dmpFilesize
644KB
-
memory/1352-64-0x0000000140000000-0x00000001400A1000-memory.dmpFilesize
644KB
-
memory/1352-68-0x0000000140000000-0x00000001400A1000-memory.dmpFilesize
644KB
-
memory/1352-66-0x0000000140000000-0x00000001400A1000-memory.dmpFilesize
644KB