Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
be2022cc704ee9381e821864f1e942e0.dll
Resource
win7-20240221-en
General
-
Target
be2022cc704ee9381e821864f1e942e0.dll
-
Size
2.0MB
-
MD5
be2022cc704ee9381e821864f1e942e0
-
SHA1
0566000064f220347470864f54b0007c15eeb31e
-
SHA256
8018d5e151a11dbaa1472e251fa5af0f73c0365e7aaef8a65a43e636c19f0278
-
SHA512
66dd9eb4c6a3796339a4fd7b992ddad42f537f6a8083cdf06b478ca97dec9f4579049923b323980a692003a50f104b308b0c45559ca96e94da7afe10a845cf77
-
SSDEEP
12288:2VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:rfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1192-5-0x00000000024B0000-0x00000000024B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2852 Dxpserver.exe 2424 cmstp.exe 2248 perfmon.exe -
Loads dropped DLL 7 IoCs
pid Process 1192 Process not Found 2852 Dxpserver.exe 1192 Process not Found 2424 cmstp.exe 1192 Process not Found 2248 perfmon.exe 1192 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Javhf = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\1nZ4LZ\\cmstp.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1936 rundll32.exe 1936 rundll32.exe 1936 rundll32.exe 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2488 1192 Process not Found 28 PID 1192 wrote to memory of 2488 1192 Process not Found 28 PID 1192 wrote to memory of 2488 1192 Process not Found 28 PID 1192 wrote to memory of 2852 1192 Process not Found 29 PID 1192 wrote to memory of 2852 1192 Process not Found 29 PID 1192 wrote to memory of 2852 1192 Process not Found 29 PID 1192 wrote to memory of 1280 1192 Process not Found 30 PID 1192 wrote to memory of 1280 1192 Process not Found 30 PID 1192 wrote to memory of 1280 1192 Process not Found 30 PID 1192 wrote to memory of 2424 1192 Process not Found 31 PID 1192 wrote to memory of 2424 1192 Process not Found 31 PID 1192 wrote to memory of 2424 1192 Process not Found 31 PID 1192 wrote to memory of 2116 1192 Process not Found 32 PID 1192 wrote to memory of 2116 1192 Process not Found 32 PID 1192 wrote to memory of 2116 1192 Process not Found 32 PID 1192 wrote to memory of 2248 1192 Process not Found 33 PID 1192 wrote to memory of 2248 1192 Process not Found 33 PID 1192 wrote to memory of 2248 1192 Process not Found 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be2022cc704ee9381e821864f1e942e0.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:2488
-
C:\Users\Admin\AppData\Local\3yOo8NK\Dxpserver.exeC:\Users\Admin\AppData\Local\3yOo8NK\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2852
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵PID:1280
-
C:\Users\Admin\AppData\Local\ukZYPButU\cmstp.exeC:\Users\Admin\AppData\Local\ukZYPButU\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2424
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:2116
-
C:\Users\Admin\AppData\Local\2GsR8TDo\perfmon.exeC:\Users\Admin\AppData\Local\2GsR8TDo\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD532e69e0e21847192539bbcbee0fbc0e7
SHA18f3544ef227bd8751e7a12f76bef0e744249391e
SHA256f3641648bff789c0c998248bccec560224ff5d858835b10631cd6892b7f3b087
SHA512392896dfd867a1a20988ab9f4f5eeb06b96fd73fc6df82526fabf675fc41dc24daa4a31ff51c911ef0ee630fc2079073a910dca3ebef9a917661692dea55692c
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
Filesize
475KB
MD5b8149c74b0358632ef61c05f835b54dd
SHA1d2e5b98d8b2dcd84d5b83ffd77d1c809e45720e6
SHA256d969ccede7daf915b4ca1219ce51e2d2599a92e1fcc2e46dd89c1e94c09697c7
SHA51220d8bd4acae746b83a87f4e008b941a5358a27cf1d709e1592a0754ee63df78f75ff83b9fb519b605ddb79baaa4830f8cd2c3b5f60ce38de7773b680349b8766
-
Filesize
182KB
MD5b0e998b2deb6fba0bbae852d0081c81e
SHA12b7d381166229bd48a0e40779a24c5b9baefc782
SHA2568d823405938a0660514caf1ae90ecc84e86ced68f1d2189fa285428e62f7e8e4
SHA512a7a17e5e305165acaaad26c0b9944f4f8cdc3b4726a51bcb8c78a7a14090d0b09272a00ca71c8f2b588a54aebb3d28d57e3ea54a7b5064279d276ec0e6a2e8fd
-
Filesize
89KB
MD5fa5237cc43ed4f949a8e9c3ce56dd17e
SHA1be30c1c92e61a28e4d1e7f047ba6b3df4d217120
SHA256d8250ead85a6078f9e90963df9436de0903a1179fbbd491d4034026b6ed08dbe
SHA51255354218d58349bd99378ef39ce92b88ff5039de27e18efec3441d528bf5b08a670d2ab89b1909adc6d2c9a05664f58bab536aa8bb9d1eed86e232fb38a7385e
-
Filesize
2.0MB
MD58b6f6939cb0cab98b43daf17d7c99072
SHA1f8c3a345994d72cb6aa44b2499e42801d98e4fa5
SHA25694f2c71fde53a83de3c4f7fe7bfe96483634bb9b9a895d72858293771951c589
SHA5124d3964194b8e14cb73cb8b8f82c0fd780e7ee4b743058136445ffd55506779a6856d2271356d7df24e198094b7a24580406e40f165da704d27df60868296b782
-
Filesize
1KB
MD59b1876affbd3c475b76c04c17cfc9f1b
SHA13fedc58cecab40c0cc3dc0fb40d7e6d3dee40947
SHA25631e5c3211d3719f83c4c6ce08e2bc24f1958b967476d27e2edf2db1857b01821
SHA5121d2fb1afaf1490df4c4218f13b3883ce7f07bafca21c988662561d853fff97f3ce6118359448c2cbf9e8f5a3cef11c69f0bec42754b4799c884815d154af1474
-
Filesize
2.0MB
MD51a44c9a0a0694e215d99bcec504abb20
SHA1f48926e78a13236b92a1628865f9d4951b72a016
SHA256c263976e2cb8fb351b1dc1e47bb5cf856a4a6c9d176d6fcc51d2723f640d23b4
SHA51221d07503ef22a7c69d4a3d83116d6937c8c515285d0ba0ba4b283d76f43cdcedf41afb9d2c8bebd667a5f5283a2b4c0b5d19a79128a548b0eac40f131df063e6
-
Filesize
2.0MB
MD5ac12051cdfea11deb97f40c5dfe84612
SHA18c9f144f780ac1db4c655183c7083735408c628f
SHA2562a87a9e4b0426ab4511ed5e84c6472d6ae2e5b9545f5eb8f2bf999fdbfe85390
SHA5129b7f511931cafe377b2f08ccd86bdcd3c3a315901c61a36600e37623c1654a5e1e43b2421a9384722fc04c3c3350c5bc452538206661eeeec25ddc7471bcc01f
-
Filesize
139KB
MD541702bcaca4ce3a464ce5ff2247d7700
SHA1c139abc636fbfd2f7da3e7dd0d271a67f4e122e9
SHA2561ac3f02729f872f44e2cade5afca314659db2f04e77448cf9e0271263d924035
SHA5127be06a106eee4de245ebcbbef41a7da6e303f0afd5da68f12ac9753587882f22927d386d22037fb6397e7dd4e7a9cc6153d5b538e2930224e11d2ec5f4e352b7
-
Filesize
795KB
MD557f96d5bdd6e6d4acec4e83aedbf4b23
SHA15060bcdbdbf392b70340d3748239292803d0b9c7
SHA256b044ccee994aea0d4469934e9db24aa59277cdb6272b51f4d52bfe3a299e8382
SHA512b79dcdabcec4176fadbf2b3adb7c132b0e722439cccc32edadfe900cc7ff48cc6579ec3bf2f58b77d161a34027ed3d9f8570a6eb0855a07c09bf4ceb4500b113
-
Filesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
Filesize
522KB
MD593d3fe31d32ee2c83cdd3161acd4481a
SHA1e39f2468bafcb28ddd22617387594ac7ce4a2370
SHA256333449cab215ab62cb933f7b6f725269ffad409add83f41f763db75e36ad172e
SHA5121cf4e8c88b67cfcec9c344a0c1382c155c55ca3f77941dde301a239c3f4a987f965d25006a711c9fc03a7cda49ffc7436b60694c8d86d2a6ed4b43f5af2b45b2
-
Filesize
256KB
MD575703481dac01cfc7be27c8056ddca90
SHA1ad73754c616b59edd0fd1f0a98a9e8a934c14238
SHA256bd8d3b8a548c1467a834e8f8dbe8101aef6f21359653a174129574666f8150bf
SHA512010fafc4cf787b18481227ea4b3e0fdecf5548c6fa3c16ed6573073b39db5fafcb297b3bbe2e19c2790983a9075594d7fc7385f4b290e3cca2a5d3032d914108
-
Filesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a
-
Filesize
45KB
MD5b6e8682dd27c85dd25ea0f0b5a89488b
SHA1b61dd6f9da6f48ca44e7d24fdfd6f5ac909fba07
SHA2567bf21cda84c9cef6b63776feaf4aefbe338309c2dcde51442d694e806b035b62
SHA5129cc1f570f44db86b2cb0648114e7bc2b4cabe6b6ad9b82700ed3e92a971bf16da22399b930351071a5f060a9a2e2ea07dfa363223d558a9e6841b98adabafa04