Analysis
-
max time kernel
35s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 02:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5258d21fdd3d1c76b00f2956c8ac9690.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
5258d21fdd3d1c76b00f2956c8ac9690.dll
-
Size
1.9MB
-
MD5
5258d21fdd3d1c76b00f2956c8ac9690
-
SHA1
2cdfbb9a16cd0eb818fff344f85daaea59a5a10b
-
SHA256
b21c536b39b5035840c086d58ac7d339344c4a02ba9f5e536010e6d0046acf46
-
SHA512
2c7e813694f46b18c619e6b808b5545db35df1e1573693b3d76fc576f90269b03155f6189cfed4c49996b0ed58e6f37d9e2b789dfb3187b8383e012f921f98e1
-
SSDEEP
12288:LVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:KfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3472-4-0x0000000006AF0000-0x0000000006AF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1636 msconfig.exe 3120 rstrui.exe 740 backgroundTaskHost.exe -
Loads dropped DLL 4 IoCs
pid Process 1636 msconfig.exe 3120 rstrui.exe 740 backgroundTaskHost.exe 740 backgroundTaskHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mbfbagbrjs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\qfQjaCEc\\rstrui.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3472 Process not Found Token: SeCreatePagefilePrivilege 3472 Process not Found Token: SeShutdownPrivilege 3472 Process not Found Token: SeCreatePagefilePrivilege 3472 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3472 Process not Found 3472 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4084 3472 Process not Found 103 PID 3472 wrote to memory of 4084 3472 Process not Found 103 PID 3472 wrote to memory of 1636 3472 Process not Found 102 PID 3472 wrote to memory of 1636 3472 Process not Found 102 PID 3472 wrote to memory of 4364 3472 Process not Found 98 PID 3472 wrote to memory of 4364 3472 Process not Found 98 PID 3472 wrote to memory of 3120 3472 Process not Found 101 PID 3472 wrote to memory of 3120 3472 Process not Found 101 PID 3472 wrote to memory of 4004 3472 Process not Found 100 PID 3472 wrote to memory of 4004 3472 Process not Found 100 PID 3472 wrote to memory of 740 3472 Process not Found 109 PID 3472 wrote to memory of 740 3472 Process not Found 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5258d21fdd3d1c76b00f2956c8ac9690.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:4364
-
C:\Users\Admin\AppData\Local\MXEnr\printfilterpipelinesvc.exeC:\Users\Admin\AppData\Local\MXEnr\printfilterpipelinesvc.exe1⤵PID:740
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe1⤵PID:4004
-
C:\Users\Admin\AppData\Local\vJR\rstrui.exeC:\Users\Admin\AppData\Local\vJR\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3120
-
C:\Users\Admin\AppData\Local\Lp28GVr\msconfig.exeC:\Users\Admin\AppData\Local\Lp28GVr\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1636
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:4084
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:740