Analysis
-
max time kernel
3s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 09:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
48a3c56fe0632fde64f2932afc94f9c0.dll
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
48a3c56fe0632fde64f2932afc94f9c0.dll
-
Size
2.9MB
-
MD5
48a3c56fe0632fde64f2932afc94f9c0
-
SHA1
22089d27037da60a74d2ba6d009e62e2800cd72a
-
SHA256
075c91511b4358c6e72aaee2e8ea3b67d6f4caee1eb2b4fa92cbf659ea7c8c62
-
SHA512
226ddcff05c1ea8249dfe3217e2d0e9101b2a45b5288175092926c5b34bd18f540970bcf6ae0970d8aa34673ab9a09033c3adc7b649f160dd07314fb4a56ad72
-
SSDEEP
12288:xVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:AfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1380-5-0x0000000002EA0000-0x0000000002EA1000-memory.dmp dridex_stager_shellcode -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48a3c56fe0632fde64f2932afc94f9c0.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2300
-
C:\Users\Admin\AppData\Local\gl6pZ3Q6\psr.exeC:\Users\Admin\AppData\Local\gl6pZ3Q6\psr.exe1⤵PID:1844
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵PID:2740
-
C:\Users\Admin\AppData\Local\NXuuQ4MB\wscript.exeC:\Users\Admin\AppData\Local\NXuuQ4MB\wscript.exe1⤵PID:1536
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:1192
-
C:\Users\Admin\AppData\Local\BoGPae\rdpclip.exeC:\Users\Admin\AppData\Local\BoGPae\rdpclip.exe1⤵PID:1440