Analysis
-
max time kernel
71s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
793df85f287f06c4764a229b404e0a7f.dll
Resource
win7-20231215-en
General
-
Target
793df85f287f06c4764a229b404e0a7f.dll
-
Size
660KB
-
MD5
793df85f287f06c4764a229b404e0a7f
-
SHA1
454ad7fe4ede68aeffa2144dc95d22618a17a17e
-
SHA256
823691284d6b7786dee73b7315b3cd146eac4160d5f7fca663cab821b66698fa
-
SHA512
e20fce0797127f695247109fa01d39db3304fee14aa34441cc5f88c3ea38c18bf8d013b2207c57dd56b542dc9eaee0100a3c3c58c326be54677e760dd7f50c9f
-
SSDEEP
6144:Z34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:ZIKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3560-3-0x0000000007B10000-0x0000000007B11000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/3992-1-0x00007FFBDE320000-0x00007FFBDE3C5000-memory.dmp dridex_payload behavioral2/memory/3560-15-0x0000000140000000-0x00000001400A5000-memory.dmp dridex_payload behavioral2/memory/3560-22-0x0000000140000000-0x00000001400A5000-memory.dmp dridex_payload behavioral2/memory/3560-33-0x0000000140000000-0x00000001400A5000-memory.dmp dridex_payload behavioral2/memory/3992-36-0x00007FFBDE320000-0x00007FFBDE3C5000-memory.dmp dridex_payload behavioral2/memory/1176-48-0x00007FFBDD720000-0x00007FFBDD7C6000-memory.dmp dridex_payload behavioral2/memory/1176-43-0x00007FFBDD720000-0x00007FFBDD7C6000-memory.dmp dridex_payload behavioral2/memory/3648-64-0x00007FFBDD720000-0x00007FFBDD7C6000-memory.dmp dridex_payload behavioral2/memory/4432-75-0x00007FFBDD610000-0x00007FFBDD6B7000-memory.dmp dridex_payload behavioral2/memory/4432-80-0x00007FFBDD610000-0x00007FFBDD6B7000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1176 slui.exe 3648 printfilterpipelinesvc.exe 4432 osk.exe -
Loads dropped DLL 3 IoCs
pid Process 1176 slui.exe 3648 printfilterpipelinesvc.exe 4432 osk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qzenv = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Security\\j1ywryR\\printfilterpipelinesvc.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA printfilterpipelinesvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3992 rundll32.exe 3992 rundll32.exe 3992 rundll32.exe 3992 rundll32.exe 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3560 Process not Found 3560 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3560 wrote to memory of 872 3560 Process not Found 106 PID 3560 wrote to memory of 872 3560 Process not Found 106 PID 3560 wrote to memory of 1176 3560 Process not Found 105 PID 3560 wrote to memory of 1176 3560 Process not Found 105 PID 3560 wrote to memory of 3484 3560 Process not Found 107 PID 3560 wrote to memory of 3484 3560 Process not Found 107 PID 3560 wrote to memory of 3648 3560 Process not Found 108 PID 3560 wrote to memory of 3648 3560 Process not Found 108 PID 3560 wrote to memory of 2224 3560 Process not Found 110 PID 3560 wrote to memory of 2224 3560 Process not Found 110 PID 3560 wrote to memory of 4432 3560 Process not Found 109 PID 3560 wrote to memory of 4432 3560 Process not Found 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\793df85f287f06c4764a229b404e0a7f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
C:\Users\Admin\AppData\Local\nHTTOPH\slui.exeC:\Users\Admin\AppData\Local\nHTTOPH\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1176
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:872
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe1⤵PID:3484
-
C:\Users\Admin\AppData\Local\TTcSUIg\printfilterpipelinesvc.exeC:\Users\Admin\AppData\Local\TTcSUIg\printfilterpipelinesvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3648
-
C:\Users\Admin\AppData\Local\f9B\osk.exeC:\Users\Admin\AppData\Local\f9B\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4432
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
664KB
MD5ce92fb27287b8d8da3b53825faebe282
SHA1b0b3a97dcfecb6a25ad52cfca9a9f8708eaa3a76
SHA25694a90a4eb25abcbbac0c023c3736473b5a29df02f1a702ca86d037b5ca244312
SHA51227f0d045d02c93cc1ebc5e5ab22716fa48d02d00f02445b3e215c980e01ef1d688cbbd732924113fdb691ec076fefa0ee8f5124b4164544168397b6129a8f215
-
Filesize
813KB
MD5331a40eabaa5870e316b401bd81c4861
SHA1ddff65771ca30142172c0d91d5bfff4eb1b12b73
SHA256105099819555ed87ef3dab70a2eaf2cb61076f453266cec57ffccb8f4c00df88
SHA51229992dbf10f327d77865af5e6ebbe66b937a5b4ad04c68cafbf4e6adbd6c6532c8a82ac7e638d97c1f053353a7c8a6d7e379f389af15443c94a1e8f9b16be5f8
-
Filesize
92KB
MD5e8c60c1cea5fe66669a567f2928da865
SHA1130273dd1a9c632a10d9cee2864175361293f020
SHA2563676a513ee82bafc02efd24f96178b6e9385947021fe46f0526f61acbd20b15d
SHA5122f3ebcf552e41b0740bcfa9643461d0f866ac92132ccc6cbf900fdee8da189466ef17f7c2da039baed8713ec569c16d17e03465bca0b2a5e5e5378537d7210d3
-
Filesize
92KB
MD50a6c9d0583ea2a2bbe2d8df974e13d3d
SHA1dd0d9b7ed6b8e833e3c0317402f82d0fe21fffee
SHA256a0a852c7d1fcd00cc2710d09f1f5afaf51efa5a69f1795faacb9c805b367abc3
SHA512da22a9c5fa741242855fbd582b2dd091908f82fcd2ef885b2cad3c00f0d0dabcd3c468e2ad2479d13c89de53bf13280e988e396fbc9482af115e53c339d3b975
-
Filesize
149KB
MD5c6a35c5c01187c39859b84e884de47ef
SHA16fef730762b70ea398eb7ff5358690fb94f73bd8
SHA256a0c4f535e7cda3451e3639fb2c3b4b586dcb686f67f03475619d22fd38c7f7bc
SHA512dbf7d088d8aa52e5a459d37f1ccccdd00e31b7bd1b15806681e79cad3c11e7b66fbe339dec9c0ab6fb1c111bc58213413ebc8b8f093f90f2e1e971e0fded8127
-
Filesize
381KB
MD53979dd404e02cd194f81b74f78d85245
SHA17c0d381c5104fbff83a33ca00f2c785c073de9a3
SHA256dd495154b1cb39a729ae8907aca4eb63e67455c31ac72a80db6adfe823799743
SHA512582f9bfef8a172bbd312db29d5decee9bfaa032e9d1889e267e99fde2769f6e4a1aed67d861ffac8e7dbf7a2dfb9c3ad4b1eb888a8f2ad584fe121820ba936d6
-
Filesize
92KB
MD5288d72978838193b8aa0ddeb45d163d6
SHA1ff1b81e3e358aaed9b73e586a1bbb2b3d8ec8651
SHA256ca50d1eb34df25fb899fe747c4ace4423c4da79bee82cdd5b813a6bb504a8f11
SHA512de492cc2853fd977c2756ae8f4c30f2cd6060f50657070ac4cf99de9ae5711c0e12d6a392fd623fd5ff80c4d5daf69528bc74c9fc45dedd666dbc8648780ec22
-
Filesize
342KB
MD589e3292a3338df70574e1a8415659204
SHA17233c59a227a40fe9ef6f74ea9b03d5545420dfd
SHA2567ae0532fc112967677baaf64272ddaa467c9004c5d0d9980b82b43143bb16afc
SHA51286b3224d7a0035d812266754c5977d698f5f1a538d0961afaa6edc20569d2de0a2b0d84889dc347bdefd65bdd8fb602673311c7889a12df10dfed24677d4097a
-
Filesize
92KB
MD54ce79158c633aedd6b20602785fd9efc
SHA1fe7c1477b9654d12a1d1f4575604a5471f5812e6
SHA2569c2ea2e54f50a4c3cc08d6d6ddb864e61290b0d8cfd7753d79ce5907dbbcf5a4
SHA51228b2e6e042cb83a1e472dece258689f840eee9ae23648ca6954f819953824cb4c7220bb1a9cfaaec862f8e8cb1ecd14687a063d4f96356c5e8565a6c7cd9e184
-
Filesize
938B
MD5df07bad1a5f4389192fc09ee163b160e
SHA1b619c2ff5ceafeb9402c3dc369d43b63c866fd41
SHA2560ab1123bcfa5a76d20a3eca57d1cd7911d0fa66800e87931f93247809468103f
SHA5122c48b6c47de94ac4a023d10a8ee1e826dfdb38e121596303150a67bea66e1a8d282de4382b2f11a07efa6a66c3a5548908c0f6d2eab19bbd08ebab875391c361
-
Filesize
664KB
MD5bca074a7366a91b631507914afcac0c1
SHA1d15420166ea0070adb76b254deac7e50188b12a3
SHA2560e11ca1228cbc474d5f0fd149fd3615d7caeadc4421cd478bb281716958e5a72
SHA512ff9c141437aa1cd6a7176b2943ae1a134be32d5711eb03aee64cad8650b013c0c54895b4de3cb1229fa8bf2b940caac2fabca9e90d99c86075dc57adaecc5094
-
Filesize
668KB
MD56e81fa44ba1b79c29a1f1e2e6af6faaf
SHA1993d4e84074a54b99a356eb3224eceb7e0b7e0f6
SHA2565f96961bd625f1511372ddb3b20380f3d9085fe9765d088b10c730ace5ee01e6
SHA512ebd94dce5c34630905ed744e7b75af2c1d934241e86717069f5b66e900906082b500f5cb494e60d5126785c569db2475e7a7732846f3b0dd1dde024643783c25