Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
3854e2d5c27f65abbdd248803bb77934a30e8ad4b8d270fd8ab20b68ab3c873f.dll
Resource
win7-20240319-en
General
-
Target
3854e2d5c27f65abbdd248803bb77934a30e8ad4b8d270fd8ab20b68ab3c873f.dll
-
Size
1.0MB
-
MD5
9143a899f20d2f4966d37b26f0f6995d
-
SHA1
c4bc31b82e53da1a04c7f872f3a9b5a7e7655594
-
SHA256
3854e2d5c27f65abbdd248803bb77934a30e8ad4b8d270fd8ab20b68ab3c873f
-
SHA512
0f92bae3982ef235a3406eac0f1873b9414cd9eb3c94edc5f4b77d2689325bd8afb75ca3dc6c3b4d574cfeefe9e6ffea778e8d8351f0bfc7be625c0f98f8c5bd
-
SSDEEP
12288:0Bim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN+:Q/nts0Q9K/0ooRQIxAk2wi0N/
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1228-4-0x00000000029E0000-0x00000000029E1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2984-1-0x000007FEF6A00000-0x000007FEF6B08000-memory.dmp dridex_payload behavioral1/memory/1228-28-0x0000000140000000-0x0000000140108000-memory.dmp dridex_payload behavioral1/memory/1228-36-0x0000000140000000-0x0000000140108000-memory.dmp dridex_payload behavioral1/memory/1228-47-0x0000000140000000-0x0000000140108000-memory.dmp dridex_payload behavioral1/memory/1228-48-0x0000000140000000-0x0000000140108000-memory.dmp dridex_payload behavioral1/memory/2984-56-0x000007FEF6A00000-0x000007FEF6B08000-memory.dmp dridex_payload behavioral1/memory/2448-65-0x000007FEF7100000-0x000007FEF7209000-memory.dmp dridex_payload behavioral1/memory/2448-69-0x000007FEF7100000-0x000007FEF7209000-memory.dmp dridex_payload behavioral1/memory/2912-81-0x000007FEF6A00000-0x000007FEF6B09000-memory.dmp dridex_payload behavioral1/memory/2912-87-0x000007FEF6A00000-0x000007FEF6B09000-memory.dmp dridex_payload behavioral1/memory/2388-103-0x000007FEF6A00000-0x000007FEF6B0A000-memory.dmp dridex_payload behavioral1/memory/2388-110-0x000007FEF6A00000-0x000007FEF6B0A000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesHardware.exewextract.exemstsc.exepid process 2448 SystemPropertiesHardware.exe 2912 wextract.exe 2388 mstsc.exe -
Loads dropped DLL 7 IoCs
Processes:
SystemPropertiesHardware.exewextract.exemstsc.exepid process 1228 2448 SystemPropertiesHardware.exe 1228 2912 wextract.exe 1228 2388 mstsc.exe 1228 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ptbza = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\v6vzgcj\\wextract.exe" -
Processes:
rundll32.exeSystemPropertiesHardware.exewextract.exemstsc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstsc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1228 wrote to memory of 2412 1228 SystemPropertiesHardware.exe PID 1228 wrote to memory of 2412 1228 SystemPropertiesHardware.exe PID 1228 wrote to memory of 2412 1228 SystemPropertiesHardware.exe PID 1228 wrote to memory of 2448 1228 SystemPropertiesHardware.exe PID 1228 wrote to memory of 2448 1228 SystemPropertiesHardware.exe PID 1228 wrote to memory of 2448 1228 SystemPropertiesHardware.exe PID 1228 wrote to memory of 2520 1228 wextract.exe PID 1228 wrote to memory of 2520 1228 wextract.exe PID 1228 wrote to memory of 2520 1228 wextract.exe PID 1228 wrote to memory of 2912 1228 wextract.exe PID 1228 wrote to memory of 2912 1228 wextract.exe PID 1228 wrote to memory of 2912 1228 wextract.exe PID 1228 wrote to memory of 2664 1228 mstsc.exe PID 1228 wrote to memory of 2664 1228 mstsc.exe PID 1228 wrote to memory of 2664 1228 mstsc.exe PID 1228 wrote to memory of 2388 1228 mstsc.exe PID 1228 wrote to memory of 2388 1228 mstsc.exe PID 1228 wrote to memory of 2388 1228 mstsc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3854e2d5c27f65abbdd248803bb77934a30e8ad4b8d270fd8ab20b68ab3c873f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵
-
C:\Users\Admin\AppData\Local\zfxhpn\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\zfxhpn\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵
-
C:\Users\Admin\AppData\Local\OxcmF\wextract.exeC:\Users\Admin\AppData\Local\OxcmF\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵
-
C:\Users\Admin\AppData\Local\RcuI0\mstsc.exeC:\Users\Admin\AppData\Local\RcuI0\mstsc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\OxcmF\VERSION.dllFilesize
1.0MB
MD5ca88f353863efba32f98313e4a44eb84
SHA1dc26de2de76bb9858b109057d3d83cff91fcc8bd
SHA256e8b040ec0311b3eb6d712f4c547fe018c69e8f4881fb7e6de80fd520e7013552
SHA5128d814e4d60374d38930576013485b0082c1078da0ff1ec6da57db6b639ea17e7fa729977ee00126c53a0a8c039a05d8ae3b488d2a50fa884715df0720e96ec23
-
C:\Users\Admin\AppData\Local\RcuI0\WINMM.dllFilesize
1.0MB
MD58298a266c462d2495a3c48d4d69fe143
SHA1232a7d261a6e525c33de97d08647a60498ad7f96
SHA256514316268c6c8b1c5b4194914e921144b518ba623e32f78e28ca78e91f135091
SHA51241f3315f6d97d924d0fcb0ce5ca0271932febb2482f776d318135a761b108fc05b49edca08179acb4d7562c1968ce5d578a85f0b58a1b84fd20448c7c812266d
-
C:\Users\Admin\AppData\Local\RcuI0\mstsc.exeFilesize
1.1MB
MD550f739538ef014b2e7ec59431749d838
SHA1b439762b8efe8cfb977e7374c11a7e4d8ed05eb3
SHA25685c510c7fa8d64c70886ea01ec99e7b9064594f021a95b4cf88359421e732be3
SHA51202e231ddc4ac012c597b9db42f8a77fbf35ca8253c030d443a0dd4db3d76a9ee1cced600f12d7bb06305e7a4da4a8fda980faad335adcb12738d80d453cb3cc8
-
C:\Users\Admin\AppData\Local\zfxhpn\SYSDM.CPLFilesize
1.0MB
MD510ed51759a0719747a13f8bc046b24c5
SHA1a7c518ca98737501a7e9a0b0e38cf198329044de
SHA25675339f41b894d397fafb1a79bfb2c4bb8447bda021158e744b7ecfc2ad92a5c0
SHA512065d7be967f15caf74b30bc116d989ea75ea161885a13d062a354a961f013491825cc3fe973c03085c4b0181aafbd61a1646cb1f4b47ac2e79b617a98ffa8ad7
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ygproaoszn.lnkFilesize
1KB
MD57cbe606ae9afdc712968dfe608675ee6
SHA10ff4dfd03979104b67d64ebd18bf24154446aa8e
SHA256731664679328a2d31c453d97e498a623b578209ab669e24861b32614ea81f830
SHA512c9710c551eefafb718cf2f78386a2d4254ba58a4047e33749e6095f46e875f6eddd31019fa2720b13076a186129cf6a7edc4651a813f719b12be6ad3a67cdfd1
-
\Users\Admin\AppData\Local\OxcmF\wextract.exeFilesize
140KB
MD51ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb
-
\Users\Admin\AppData\Local\zfxhpn\SystemPropertiesHardware.exeFilesize
80KB
MD5c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
memory/1228-25-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-36-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-8-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-15-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-16-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-14-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-13-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-12-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-18-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-17-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-20-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-21-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-19-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-22-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-23-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-24-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-26-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-11-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-27-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-28-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-29-0x00000000029B0000-0x00000000029B7000-memory.dmpFilesize
28KB
-
memory/1228-9-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-37-0x0000000077B20000-0x0000000077B22000-memory.dmpFilesize
8KB
-
memory/1228-38-0x0000000077B50000-0x0000000077B52000-memory.dmpFilesize
8KB
-
memory/1228-47-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-48-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-3-0x00000000777B6000-0x00000000777B7000-memory.dmpFilesize
4KB
-
memory/1228-4-0x00000000029E0000-0x00000000029E1000-memory.dmpFilesize
4KB
-
memory/1228-6-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-10-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-7-0x0000000140000000-0x0000000140108000-memory.dmpFilesize
1.0MB
-
memory/1228-83-0x00000000777B6000-0x00000000777B7000-memory.dmpFilesize
4KB
-
memory/2388-103-0x000007FEF6A00000-0x000007FEF6B0A000-memory.dmpFilesize
1.0MB
-
memory/2388-105-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2388-110-0x000007FEF6A00000-0x000007FEF6B0A000-memory.dmpFilesize
1.0MB
-
memory/2448-69-0x000007FEF7100000-0x000007FEF7209000-memory.dmpFilesize
1.0MB
-
memory/2448-64-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/2448-65-0x000007FEF7100000-0x000007FEF7209000-memory.dmpFilesize
1.0MB
-
memory/2912-81-0x000007FEF6A00000-0x000007FEF6B09000-memory.dmpFilesize
1.0MB
-
memory/2912-84-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/2912-87-0x000007FEF6A00000-0x000007FEF6B09000-memory.dmpFilesize
1.0MB
-
memory/2984-0-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2984-1-0x000007FEF6A00000-0x000007FEF6B08000-memory.dmpFilesize
1.0MB
-
memory/2984-56-0x000007FEF6A00000-0x000007FEF6B08000-memory.dmpFilesize
1.0MB