Analysis
-
max time kernel
5s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b1cddc9ba3a71be2ba81c6a7174e89d0.dll
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
b1cddc9ba3a71be2ba81c6a7174e89d0.dll
-
Size
2.9MB
-
MD5
b1cddc9ba3a71be2ba81c6a7174e89d0
-
SHA1
4e61a4f6e52682ae084df93bfd294a382ca72ceb
-
SHA256
35c9ef92ec98ec941151d4420dd4195c60bc822cc60f36477229c2326b9909f9
-
SHA512
2e439bf9b16a6136518a367df0da9c6603f284afd7ae6ad7eb7b955004b085858cc1986d4bc1252aaff4526ac71fc79b570377fab9ad72463e4ff8d8f3b22f31
-
SSDEEP
12288:TVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:CfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1072-5-0x0000000002E80000-0x0000000002E81000-memory.dmp dridex_stager_shellcode -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KtHVm Process not Found -
Executes dropped EXE 1 IoCs
pid Process 1352 perfmon.exe -
Loads dropped DLL 2 IoCs
pid Process 1072 Process not Found 1352 perfmon.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1852 rundll32.exe 1852 rundll32.exe 1852 rundll32.exe 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found 1072 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1684 1072 Process not Found 28 PID 1072 wrote to memory of 1684 1072 Process not Found 28 PID 1072 wrote to memory of 1684 1072 Process not Found 28 PID 1072 wrote to memory of 1352 1072 Process not Found 29 PID 1072 wrote to memory of 1352 1072 Process not Found 29 PID 1072 wrote to memory of 1352 1072 Process not Found 29 PID 1072 wrote to memory of 1440 1072 Process not Found 30 PID 1072 wrote to memory of 1440 1072 Process not Found 30 PID 1072 wrote to memory of 1440 1072 Process not Found 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1cddc9ba3a71be2ba81c6a7174e89d0.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:1684
-
C:\Users\Admin\AppData\Local\ZvnNG\perfmon.exeC:\Users\Admin\AppData\Local\ZvnNG\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1352
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:1440
-
C:\Users\Admin\AppData\Local\17gi\msdt.exeC:\Users\Admin\AppData\Local\17gi\msdt.exe1⤵PID:1444
-
C:\Users\Admin\AppData\Local\Q0F7O\dwm.exeC:\Users\Admin\AppData\Local\Q0F7O\dwm.exe1⤵PID:276
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:1568