Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
5e8681d346f5ccaf1626cfc6d89c697e22de14a91644f71ea4217c88fe0e47f9.dll
Resource
win7-20240221-en
General
-
Target
5e8681d346f5ccaf1626cfc6d89c697e22de14a91644f71ea4217c88fe0e47f9.dll
-
Size
1.0MB
-
MD5
51a75f6aeda5db4e23cb7ca20e26c2c9
-
SHA1
c0f4e297aa0e2ec7ce340f0e33778d0345e88028
-
SHA256
5e8681d346f5ccaf1626cfc6d89c697e22de14a91644f71ea4217c88fe0e47f9
-
SHA512
c815ca336be0635096323df11a166985915990936e601af39ed222caa0a56fd204193c69895d7ad4174e3daf5df9d4e267b5dde8d5dcf7797722c36e7390078d
-
SSDEEP
12288:C38uea4w46+K1FZPfxyMs2SRXTajPomqkpyrJXy6mfvHELWUbxdewWRa7CkhkgjS:g8uea4w467D5/0ypyFYELW8xFZmMXJZ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1220-4-0x0000000002E10000-0x0000000002E11000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1288-0-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral1/memory/1220-36-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral1/memory/1220-47-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral1/memory/1288-53-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral1/memory/1220-54-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral1/memory/2600-65-0x0000000140000000-0x000000014010A000-memory.dmp dridex_payload behavioral1/memory/2600-69-0x0000000140000000-0x000000014010A000-memory.dmp dridex_payload behavioral1/memory/2740-90-0x0000000140000000-0x000000014010A000-memory.dmp dridex_payload behavioral1/memory/1660-102-0x0000000140000000-0x000000014010B000-memory.dmp dridex_payload behavioral1/memory/1660-105-0x0000000140000000-0x000000014010B000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
slui.exewscript.exexpsrchvw.exepid process 2600 slui.exe 2740 wscript.exe 1660 xpsrchvw.exe -
Loads dropped DLL 8 IoCs
Processes:
slui.exewscript.exexpsrchvw.exepid process 1220 2600 slui.exe 1220 1220 2740 wscript.exe 1220 1660 xpsrchvw.exe 1220 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Javhf = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\NATIVE~1\\0V\\wscript.exe" -
Processes:
slui.exewscript.exexpsrchvw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeslui.exepid process 1288 regsvr32.exe 1288 regsvr32.exe 1288 regsvr32.exe 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 2600 slui.exe 2600 slui.exe 1220 1220 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1220 wrote to memory of 2492 1220 slui.exe PID 1220 wrote to memory of 2492 1220 slui.exe PID 1220 wrote to memory of 2492 1220 slui.exe PID 1220 wrote to memory of 2600 1220 slui.exe PID 1220 wrote to memory of 2600 1220 slui.exe PID 1220 wrote to memory of 2600 1220 slui.exe PID 1220 wrote to memory of 2608 1220 wscript.exe PID 1220 wrote to memory of 2608 1220 wscript.exe PID 1220 wrote to memory of 2608 1220 wscript.exe PID 1220 wrote to memory of 2740 1220 wscript.exe PID 1220 wrote to memory of 2740 1220 wscript.exe PID 1220 wrote to memory of 2740 1220 wscript.exe PID 1220 wrote to memory of 2204 1220 xpsrchvw.exe PID 1220 wrote to memory of 2204 1220 xpsrchvw.exe PID 1220 wrote to memory of 2204 1220 xpsrchvw.exe PID 1220 wrote to memory of 1660 1220 xpsrchvw.exe PID 1220 wrote to memory of 1660 1220 xpsrchvw.exe PID 1220 wrote to memory of 1660 1220 xpsrchvw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5e8681d346f5ccaf1626cfc6d89c697e22de14a91644f71ea4217c88fe0e47f9.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵
-
C:\Users\Admin\AppData\Local\eTd1yjln\slui.exeC:\Users\Admin\AppData\Local\eTd1yjln\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵
-
C:\Users\Admin\AppData\Local\csV1f\wscript.exeC:\Users\Admin\AppData\Local\csV1f\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵
-
C:\Users\Admin\AppData\Local\gn1GxiAK\xpsrchvw.exeC:\Users\Admin\AppData\Local\gn1GxiAK\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\csV1f\VERSION.dllFilesize
1.0MB
MD50f91bc2b26a480d09aebd35f6c70cb6f
SHA1f7a0000ae4c9dd33beb5457c7a54749c49a7940b
SHA256d98dadef264192528d92ae2552d51be6068cf691c821957f8fa5d3eb5d7ec73c
SHA512d5d2261d9694ab98f4074228fa859cdedd0fd50843b836209a594c02c2dbba336b90ad75587d2fb4bef7f0ce65050cc6fae7d0507a38202303c3b62abd02370b
-
C:\Users\Admin\AppData\Local\eTd1yjln\slui.exeFilesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
C:\Users\Admin\AppData\Local\gn1GxiAK\WINMM.dllFilesize
1.0MB
MD5491d523367904dfc6ffce31ca3826f1f
SHA13f9efddfd1897ab3498f493db6d68cfdfb43b8d5
SHA256ebc2c1dbba2c8ec33f60ad52b297e2b301d9ec849333ec8b28ef6eb07dce1147
SHA512e362ce894340162be4cd43861003fa6e10d35e8da78c4e02b5717224e857eec196609a35f525a7dea8c69f0a7c6b0fb0168bc5b384ed5b3246000808ae3bf83f
-
C:\Users\Admin\AppData\Local\gn1GxiAK\xpsrchvw.exeFilesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Xwtifesqpwfy.lnkFilesize
1KB
MD54628ca0344eacb35981b5f7eeee797b1
SHA1df946e8404c50ccf03367f07ac8ef4b6170c8bf1
SHA2564a8fbf712aed63f3bac68592d197a0e92c2ba1bf6a12912d79b06ecbba977348
SHA51287fb6c822cd005fdfeac52ab7357733c3ddcb721763340e25b9b6fe4c5945f801f54fbe13ac785da892f46feb585ce3c0da3fef953dc505ff72724e3444643d0
-
\Users\Admin\AppData\Local\csV1f\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Local\eTd1yjln\WINBRAND.dllFilesize
1.0MB
MD58ae9714471399f62f6ddb71b6de6000e
SHA1f0ca525166e0db66808a73987d127096f8375d7d
SHA25613288b2ccc55811107e09a6cc232cbca4b7a19e044596b8b14f5fcb24e5e0787
SHA51295c8e419fabc1109c7a0d3539ff05f3fcc26b2c15202ca1da88514e27ceedd9c8b606b7fcaece66ff6de234dac42f9d55dc31446eb3766ab38f87e5146b10873
-
memory/1220-11-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-38-0x00000000775A0000-0x00000000775A2000-memory.dmpFilesize
8KB
-
memory/1220-16-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-23-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-36-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-27-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-26-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-25-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-22-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-21-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-20-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-19-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-18-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-17-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-15-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-14-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-13-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-3-0x0000000077206000-0x0000000077207000-memory.dmpFilesize
4KB
-
memory/1220-10-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-9-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-8-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-35-0x0000000002A90000-0x0000000002A97000-memory.dmpFilesize
28KB
-
memory/1220-37-0x0000000077570000-0x0000000077572000-memory.dmpFilesize
8KB
-
memory/1220-47-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-4-0x0000000002E10000-0x0000000002E11000-memory.dmpFilesize
4KB
-
memory/1220-54-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-57-0x0000000077206000-0x0000000077207000-memory.dmpFilesize
4KB
-
memory/1220-24-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-7-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-6-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1220-12-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1288-53-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1288-0-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/1288-2-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1660-102-0x0000000140000000-0x000000014010B000-memory.dmpFilesize
1.0MB
-
memory/1660-105-0x0000000140000000-0x000000014010B000-memory.dmpFilesize
1.0MB
-
memory/2600-69-0x0000000140000000-0x000000014010A000-memory.dmpFilesize
1.0MB
-
memory/2600-65-0x0000000140000000-0x000000014010A000-memory.dmpFilesize
1.0MB
-
memory/2600-67-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/2740-87-0x00000000001F0000-0x00000000001F7000-memory.dmpFilesize
28KB
-
memory/2740-90-0x0000000140000000-0x000000014010A000-memory.dmpFilesize
1.0MB