Analysis
-
max time kernel
61s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1f0b38d9dc62745336ed59f23ef9d930_JC.dll
Resource
win7-20230831-en
General
-
Target
NEAS.1f0b38d9dc62745336ed59f23ef9d930_JC.dll
-
Size
3.7MB
-
MD5
1f0b38d9dc62745336ed59f23ef9d930
-
SHA1
ca7103f7e63dc73d6539dc31a6f1f897ffee4411
-
SHA256
f7ecbb2280d3798f34c6d54d342aaa1ee2be6fb909570643712fb9285456517e
-
SHA512
9d383d343322f11f70a4255f2062dffcc77ea2af2ea31575941dcbf7dd7886bd938c1111385028098e1184568919986714cd57722da442397cc64924636d93e0
-
SSDEEP
24576:P8uea4w467D5/0ypyFYELW8xFZmMXJZA:FXyFYELpT
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1180-4-0x0000000002210000-0x0000000002211000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2188-1-0x0000000140000000-0x00000001403AD000-memory.dmp dridex_payload behavioral1/memory/2188-46-0x0000000140000000-0x00000001403AD000-memory.dmp dridex_payload -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 2108 BdeUISrv.exe 2960 DeviceDisplayObjectProvider.exe 1236 recdisc.exe -
Loads dropped DLL 7 IoCs
pid Process 2604 explorer.exe 2108 BdeUISrv.exe 2604 explorer.exe 2960 DeviceDisplayObjectProvider.exe 2604 explorer.exe 1236 recdisc.exe 2604 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dowooq = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\FLASHP~1\\sys\\zN0YQ\\DEVICE~1.EXE" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DeviceDisplayObjectProvider.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2604 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe Token: SeShutdownPrivilege 2604 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe 2604 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2292 2604 explorer.exe 32 PID 2604 wrote to memory of 2292 2604 explorer.exe 32 PID 2604 wrote to memory of 2292 2604 explorer.exe 32 PID 2604 wrote to memory of 2108 2604 explorer.exe 33 PID 2604 wrote to memory of 2108 2604 explorer.exe 33 PID 2604 wrote to memory of 2108 2604 explorer.exe 33 PID 2604 wrote to memory of 1668 2604 explorer.exe 34 PID 2604 wrote to memory of 1668 2604 explorer.exe 34 PID 2604 wrote to memory of 1668 2604 explorer.exe 34 PID 2604 wrote to memory of 2960 2604 explorer.exe 35 PID 2604 wrote to memory of 2960 2604 explorer.exe 35 PID 2604 wrote to memory of 2960 2604 explorer.exe 35 PID 2604 wrote to memory of 340 2604 explorer.exe 36 PID 2604 wrote to memory of 340 2604 explorer.exe 36 PID 2604 wrote to memory of 340 2604 explorer.exe 36 PID 2604 wrote to memory of 1236 2604 explorer.exe 37 PID 2604 wrote to memory of 1236 2604 explorer.exe 37 PID 2604 wrote to memory of 1236 2604 explorer.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.1f0b38d9dc62745336ed59f23ef9d930_JC.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe2⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\TVmOxg\BdeUISrv.exeC:\Users\Admin\AppData\Local\TVmOxg\BdeUISrv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2108
-
-
C:\Windows\system32\DeviceDisplayObjectProvider.exeC:\Windows\system32\DeviceDisplayObjectProvider.exe2⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\7P33kn\DeviceDisplayObjectProvider.exeC:\Users\Admin\AppData\Local\7P33kn\DeviceDisplayObjectProvider.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2960
-
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe2⤵PID:340
-
-
C:\Users\Admin\AppData\Local\aMgy\recdisc.exeC:\Users\Admin\AppData\Local\aMgy\recdisc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf
-
Filesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf
-
Filesize
3.7MB
MD50cf7cc466b43fcb8b532328dbb546bc6
SHA108a1d5bec9bad973dbb2ae9a559f7fb05c49727b
SHA256d600cc97baf84d20585f615ad2be886289989b9d2b53817d3a1ca75abe6141f7
SHA51203ae0da8f40d9de0d16edab4c81539c06490ef6ccf73e59052eb3778e24e98de7fc782878537dfbdfee13f4946753bada65d45b2af78fc540cd2e6d66c163d94
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
Filesize
3.7MB
MD5d35b609bc1e574cb1d859ae8b9ca8f37
SHA1d8ee5136308eb4c9573896cd397f8a68e425f12a
SHA25627b96744c082f7e2cbf8533b4bed4d519ebfca4a47ea4687e41595475fd3b5b8
SHA512dac8a3bdc999e3ad8468defabc6fe15b28af0dc192fc246c61ad084c920311f59a2853c22c6e6a03ea7f78c25ddc993463624933a16b19aec5ceadfb884484b0
-
Filesize
3.7MB
MD5bd765fda0819d88b07132ca03d996223
SHA1315516d2e7611f8ef903b94ccc2d5f0968ecf8ec
SHA2568e33bcbaaf758fa6d2bcbe21f227ce5e19126b78ac336d31ac7254c3d35d489f
SHA512cc25285ebf2d4dc246e8d29074ccea049ace4f998e21aef70237181730be01377800995d87e1b2d514b8a29ffd78e555665d65f2f21d4d384b898396a1e36af8
-
Filesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
Filesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
Filesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf
-
Filesize
3.7MB
MD50cf7cc466b43fcb8b532328dbb546bc6
SHA108a1d5bec9bad973dbb2ae9a559f7fb05c49727b
SHA256d600cc97baf84d20585f615ad2be886289989b9d2b53817d3a1ca75abe6141f7
SHA51203ae0da8f40d9de0d16edab4c81539c06490ef6ccf73e59052eb3778e24e98de7fc782878537dfbdfee13f4946753bada65d45b2af78fc540cd2e6d66c163d94
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
Filesize
3.7MB
MD5d35b609bc1e574cb1d859ae8b9ca8f37
SHA1d8ee5136308eb4c9573896cd397f8a68e425f12a
SHA25627b96744c082f7e2cbf8533b4bed4d519ebfca4a47ea4687e41595475fd3b5b8
SHA512dac8a3bdc999e3ad8468defabc6fe15b28af0dc192fc246c61ad084c920311f59a2853c22c6e6a03ea7f78c25ddc993463624933a16b19aec5ceadfb884484b0
-
Filesize
3.7MB
MD5bd765fda0819d88b07132ca03d996223
SHA1315516d2e7611f8ef903b94ccc2d5f0968ecf8ec
SHA2568e33bcbaaf758fa6d2bcbe21f227ce5e19126b78ac336d31ac7254c3d35d489f
SHA512cc25285ebf2d4dc246e8d29074ccea049ace4f998e21aef70237181730be01377800995d87e1b2d514b8a29ffd78e555665d65f2f21d4d384b898396a1e36af8
-
Filesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
Filesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4