Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-03-2024 16:29
Static task
static1
Behavioral task
behavioral1
Sample
d3fa6fcc3a459eecd5f814bd57b697ae.dll
Resource
win7-20240221-en
General
-
Target
d3fa6fcc3a459eecd5f814bd57b697ae.dll
-
Size
1004KB
-
MD5
d3fa6fcc3a459eecd5f814bd57b697ae
-
SHA1
62d3d9e4786e08e375dd4b3129ffffa8a1094c3f
-
SHA256
39c60c6c9f0757516684c5667be66d03e241ac56e792e570398e91781a85865e
-
SHA512
f1e30751409d71eddb8a60eb6b7b51efa0d70671482a35a93a8b8d023cf76dd05eb259fc751d634e0a589b09c5a2ae5bcb8d995d5b35195bda35218c6e9ed5f3
-
SSDEEP
12288:d6BBWGJW6eC85Df97+yXUj7SncCxj8iHGo59S1WQSCtEdFO7YKJf6:d6BQBjlc728jo7S1bl6FbK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-5-0x0000000002A20000-0x0000000002A21000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
pid Process 2464 consent.exe 1060 SystemPropertiesDataExecutionPrevention.exe 1976 rdpshell.exe 2476 msra.exe -
Loads dropped DLL 9 IoCs
pid Process 1204 Process not Found 2464 consent.exe 1204 Process not Found 1060 SystemPropertiesDataExecutionPrevention.exe 1204 Process not Found 1976 rdpshell.exe 1204 Process not Found 2476 msra.exe 1204 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dbbbckkcyxuv = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\b45o\\SYSTEM~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA consent.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 rundll32.exe 2092 rundll32.exe 2092 rundll32.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2424 1204 Process not Found 28 PID 1204 wrote to memory of 2424 1204 Process not Found 28 PID 1204 wrote to memory of 2424 1204 Process not Found 28 PID 1204 wrote to memory of 2464 1204 Process not Found 29 PID 1204 wrote to memory of 2464 1204 Process not Found 29 PID 1204 wrote to memory of 2464 1204 Process not Found 29 PID 1204 wrote to memory of 596 1204 Process not Found 30 PID 1204 wrote to memory of 596 1204 Process not Found 30 PID 1204 wrote to memory of 596 1204 Process not Found 30 PID 1204 wrote to memory of 1060 1204 Process not Found 31 PID 1204 wrote to memory of 1060 1204 Process not Found 31 PID 1204 wrote to memory of 1060 1204 Process not Found 31 PID 1204 wrote to memory of 1032 1204 Process not Found 33 PID 1204 wrote to memory of 1032 1204 Process not Found 33 PID 1204 wrote to memory of 1032 1204 Process not Found 33 PID 1204 wrote to memory of 1976 1204 Process not Found 34 PID 1204 wrote to memory of 1976 1204 Process not Found 34 PID 1204 wrote to memory of 1976 1204 Process not Found 34 PID 1204 wrote to memory of 2888 1204 Process not Found 36 PID 1204 wrote to memory of 2888 1204 Process not Found 36 PID 1204 wrote to memory of 2888 1204 Process not Found 36 PID 1204 wrote to memory of 2476 1204 Process not Found 37 PID 1204 wrote to memory of 2476 1204 Process not Found 37 PID 1204 wrote to memory of 2476 1204 Process not Found 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3fa6fcc3a459eecd5f814bd57b697ae.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:2424
-
C:\Users\Admin\AppData\Local\qkoz\consent.exeC:\Users\Admin\AppData\Local\qkoz\consent.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2464
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵PID:596
-
C:\Users\Admin\AppData\Local\BRnU\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\BRnU\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1060
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:1032
-
C:\Users\Admin\AppData\Local\vWS9x0kp\rdpshell.exeC:\Users\Admin\AppData\Local\vWS9x0kp\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:2888
-
C:\Users\Admin\AppData\Local\iza70\msra.exeC:\Users\Admin\AppData\Local\iza70\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1008KB
MD5aa40042ad70cb1d092664e83ba4b53d5
SHA1a06bfcf74ed238d8aacce166027da1204b061708
SHA25638c95690e748a63fdbfbd5825df6a864463b67672ec4ad4a5a387027034dda7f
SHA5127ad03adbc9454e3df67041477e629dd0f69e43de6b662c1a478db2d4046132aae9cd494f61058e44ae81b5ff663d777f8275d2b4bcc73af2e368d87ee98b39dc
-
Filesize
80KB
MD5e43ff7785fac643093b3b16a9300e133
SHA1a30688e84c0b0a22669148fe87680b34fcca2fba
SHA256c8e1b3ecce673035a934d65b25c43ec23416f5bbf52d772e24e48e6fd3e77e9b
SHA51261260999bb57817dea2d404bcf093820679e597298c752d38db181fe9963b5fa47e070d6a3c7c970905035b396389bb02946b44869dc8b9560acc419b065999a
-
Filesize
1008KB
MD5387884a63d6bda137d8b2059d92afe19
SHA18b0c69ddd27b4dd3ac9e1c758cd91d4a3a78d156
SHA256f5506c91277486cc5cb33b050adf3f25e12528b27b6d81a75fd2a8393c9eb32d
SHA512f483c5aaf38460c477a8e1ff01f37c0d58497dc6252dcabbdf831a4ec12ef255fda419895b9d29674e737f0a445b016cf5e1fa9c253f33b66e939713d1de4211
-
Filesize
1008KB
MD5d4c8e5c30f4416bfa61d2f4e49d257c6
SHA15c00e2fe2f1d7df04a2674525755e91706bfeb87
SHA25694357a797e69641d6e29cb9529f11138c47860ebfe5e73a6b7d7d9a1fa104a18
SHA51217c997ab76a47b4069ea2d062fa4f0a31a5f29fa3ece68e3468ec4a9967310f4a20b751ed567da910b840c56077c1b5d9c0f59a3cd0d12b8a73e09a4863c2713
-
Filesize
960KB
MD5a26dd397d54d06d2e9996f580f828ec3
SHA1b73d5ed7ecb5266f1cc33b23f21294453f11da74
SHA256c3d84a050965f7e8e946c2ec1ae3e793c3aaa93713af400e71e81ae6a0ea8123
SHA5121496d4043597de92e71fb6e09527019fa803bd97b79aa23f9fdfc1a7f0bb49768cdcbbcc94e56208c71558d87f41d701377868f22277b8a79939631de70d2c7c
-
Filesize
292KB
MD5a62dfcea3a58ba8fcf32f831f018fe3f
SHA175f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b
SHA256f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e
SHA5129a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603
-
Filesize
1KB
MD527c7c2a9770e711f00914cf8ab0204b4
SHA1c8fddd90c62e39169e7ad1c98480c8f6c04c6131
SHA256bc2393694cdba7f462762c09900548f4d436db92010d0a68d447a3adaccd326b
SHA512d35adb0674adf699dc79a8c5188f3603ffa146904a162c45d984101f1527fa0d1057c79793db3640d41bb9c080427a1460215cf841cd99b0210fb1e2cc16633a
-
Filesize
75KB
MD5717a9779fcc73c10ac77546e64d20011
SHA1c36e9826f46f3cd32032520724e448b5db940160
SHA2566d3cd1ea5bfaa3e5040035525c9755e7b9de36bb746b109cb45e9b831921f8cb
SHA512851eb655a251eed8f0e34932b21f9de46cc54053f699195b0c135eb90c6243c319ba2458327491f504f28c12937c7507e7fda576d9dd1cd8199799c7f2b7504f
-
Filesize
636KB
MD5e79df53bad587e24b3cf965a5746c7b6
SHA187a97ec159a3fc1db211f3c2c62e4d60810e7a70
SHA2564e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d
SHA5129a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb
-
Filesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7
-
Filesize
896KB
MD534d008ac794a53f2b85267eaeddb31e6
SHA10d7b1d2e56855fdf361a6b7c27381600e87bc40c
SHA2563f61f6d60c60a3c6dbd72cf218313d144365c9d5bac53db74b24a001aaf9484c
SHA512e8bae5d2c3bfa4ae6d6ff326e308287ec4e902a021659d0c4900878331c89d0dadcf3f4ccafa2c528011d4fa14e0c9820f5126a237afcca8c11a6ac083ba8849