Analysis
-
max time kernel
8s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 03:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
26abc455e4debb7aa473e6504e9b5217.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
26abc455e4debb7aa473e6504e9b5217.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
26abc455e4debb7aa473e6504e9b5217.dll
-
Size
1.7MB
-
MD5
26abc455e4debb7aa473e6504e9b5217
-
SHA1
c2534421af8697df124666e7994c55d27dcfb800
-
SHA256
5488dc25e4ba8344842c5664d608f1040987837f7f167331c6613090c35ae4b2
-
SHA512
214ee95e55b7dceaf90b351e984e88d99d9e0561cab6b1769afdc1591f3e8bfd7ab2bf037b7538bb18084e87e60a29a9a43d86e5e5a876de9a0fbfdc06147ef7
-
SSDEEP
12288:2VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ15:rfP7fWsK5z9A+WGAW+V5SB6Ct4bnb5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1196-5-0x00000000024A0000-0x00000000024A1000-memory.dmp dridex_stager_shellcode -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1944 rundll32.exe 1944 rundll32.exe 1944 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26abc455e4debb7aa473e6504e9b5217.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
C:\Users\Admin\AppData\Local\SnPx\javaws.exeC:\Users\Admin\AppData\Local\SnPx\javaws.exe1⤵PID:1240
-
C:\Windows\system32\javaws.exeC:\Windows\system32\javaws.exe1⤵PID:2956
-
C:\Users\Admin\AppData\Local\ZzMr\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\ZzMr\SystemPropertiesComputerName.exe1⤵PID:2832
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵PID:2420
-
C:\Users\Admin\AppData\Local\GKxnb\icardagt.exeC:\Users\Admin\AppData\Local\GKxnb\icardagt.exe1⤵PID:768
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵PID:1620