Analysis
-
max time kernel
149s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
5e8681d346f5ccaf1626cfc6d89c697e22de14a91644f71ea4217c88fe0e47f9.dll
Resource
win7-20240221-en
General
-
Target
5e8681d346f5ccaf1626cfc6d89c697e22de14a91644f71ea4217c88fe0e47f9.dll
-
Size
1.0MB
-
MD5
51a75f6aeda5db4e23cb7ca20e26c2c9
-
SHA1
c0f4e297aa0e2ec7ce340f0e33778d0345e88028
-
SHA256
5e8681d346f5ccaf1626cfc6d89c697e22de14a91644f71ea4217c88fe0e47f9
-
SHA512
c815ca336be0635096323df11a166985915990936e601af39ed222caa0a56fd204193c69895d7ad4174e3daf5df9d4e267b5dde8d5dcf7797722c36e7390078d
-
SSDEEP
12288:C38uea4w46+K1FZPfxyMs2SRXTajPomqkpyrJXy6mfvHELWUbxdewWRa7CkhkgjS:g8uea4w467D5/0ypyFYELW8xFZmMXJZ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3556-4-0x0000000002DE0000-0x0000000002DE1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/4116-0-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral2/memory/3556-48-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral2/memory/3556-37-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral2/memory/4116-52-0x0000000140000000-0x0000000140109000-memory.dmp dridex_payload behavioral2/memory/1404-60-0x0000000140000000-0x000000014010A000-memory.dmp dridex_payload behavioral2/memory/1404-66-0x0000000140000000-0x000000014010A000-memory.dmp dridex_payload behavioral2/memory/2400-81-0x0000000140000000-0x000000014010A000-memory.dmp dridex_payload behavioral2/memory/2400-86-0x0000000140000000-0x000000014010A000-memory.dmp dridex_payload behavioral2/memory/1468-111-0x0000000140000000-0x000000014010A000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
Processes:
SystemPropertiesAdvanced.exeGamePanel.exeNarrator.exeddodiag.exepid process 1404 SystemPropertiesAdvanced.exe 2400 GamePanel.exe 532 Narrator.exe 1468 ddodiag.exe -
Loads dropped DLL 4 IoCs
Processes:
SystemPropertiesAdvanced.exeGamePanel.exeddodiag.exepid process 1404 SystemPropertiesAdvanced.exe 2400 GamePanel.exe 2400 GamePanel.exe 1468 ddodiag.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Minhbfns = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\ot6Dkbbn\\GamePanel.exe" -
Processes:
SystemPropertiesAdvanced.exeGamePanel.exeddodiag.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ddodiag.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 4116 regsvr32.exe 4116 regsvr32.exe 4116 regsvr32.exe 4116 regsvr32.exe 4116 regsvr32.exe 4116 regsvr32.exe 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 3556 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
pid process 3556 3556 3556 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 3556 3556 3556 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3556 -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
description pid process target process PID 3556 wrote to memory of 4320 3556 SystemPropertiesAdvanced.exe PID 3556 wrote to memory of 4320 3556 SystemPropertiesAdvanced.exe PID 3556 wrote to memory of 1404 3556 SystemPropertiesAdvanced.exe PID 3556 wrote to memory of 1404 3556 SystemPropertiesAdvanced.exe PID 3556 wrote to memory of 1960 3556 GamePanel.exe PID 3556 wrote to memory of 1960 3556 GamePanel.exe PID 3556 wrote to memory of 2400 3556 GamePanel.exe PID 3556 wrote to memory of 2400 3556 GamePanel.exe PID 3556 wrote to memory of 1100 3556 Narrator.exe PID 3556 wrote to memory of 1100 3556 Narrator.exe PID 3556 wrote to memory of 3160 3556 ddodiag.exe PID 3556 wrote to memory of 3160 3556 ddodiag.exe PID 3556 wrote to memory of 1468 3556 ddodiag.exe PID 3556 wrote to memory of 1468 3556 ddodiag.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5e8681d346f5ccaf1626cfc6d89c697e22de14a91644f71ea4217c88fe0e47f9.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵PID:4320
-
C:\Users\Admin\AppData\Local\HRru97X\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\HRru97X\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1404
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵PID:1960
-
C:\Users\Admin\AppData\Local\Qip7B\GamePanel.exeC:\Users\Admin\AppData\Local\Qip7B\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2400
-
C:\Windows\system32\Narrator.exeC:\Windows\system32\Narrator.exe1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Vn21\Narrator.exeC:\Users\Admin\AppData\Local\Vn21\Narrator.exe1⤵
- Executes dropped EXE
PID:532
-
C:\Windows\system32\ddodiag.exeC:\Windows\system32\ddodiag.exe1⤵PID:3160
-
C:\Users\Admin\AppData\Local\j0o\ddodiag.exeC:\Users\Admin\AppData\Local\j0o\ddodiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5137f52cdc73e9506b12ff8497e1aeb44
SHA1ad9195e1be09682e40de0c8ad213a34ac45c8005
SHA2562b186e0a44c7b7a0c483649ec7287cb85458c94b00b5d3df7d73cc97c8de4e21
SHA51256a33ab516c0e3ce2e498916b83072f1e8ec54c7cdccd292fcb110d5d77d36e793daff506f526fc46b536f08ff413dd7b33fa50e64447f064f0ee4b1d51a721a
-
Filesize
82KB
MD5fa040b18d2d2061ab38cf4e52e753854
SHA1b1b37124e9afd6c860189ce4d49cebbb2e4c57bc
SHA256c61fa0f8c5d8d61110adbcceaa453a6c1d31255b3244dc7e3b605a4a931c245c
SHA512511f5981bd2c446f1f3039f6674f972651512305630bd688b1ef159af36a23cb836b43d7010b132a86b5f4d6c46206057abd31600f1e7dc930cb32ed962298a4
-
Filesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
Filesize
1.0MB
MD5c1feb59ad1943c8f9d6176e0cf2ebb3b
SHA108c974f0480d007dab2b1010f891bf616912b9d6
SHA2561a3d476551cff254ceb1c2879b7cd6078e091a382a7e87e02e64c6224d900a74
SHA512993e4050a4f5d66423a598b54d124ab096f9d8209987c9c213ac65f89bfa15eeec27cdf9ed6beed4b19574321042f98117c4a6fe5b07472c7d066c65da040cd9
-
Filesize
521KB
MD5d92defaa4d346278480d2780325d8d18
SHA16494d55b2e5064ffe8add579edfcd13c3e69fffe
SHA25669b8c93d9b262b36e2bdc223cc0d6e312cc471b49d7cc36befbba1f863a05d83
SHA512b82c0fbc07361e4ad6e4ab171e55e1e41e9312ba995dce90696ca90f734f5d1ea11371ca046e8680ea566a1c2e0643ab86f1f6dcf6cbd05aed8448425a2830b5
-
Filesize
1.0MB
MD5dbf4f125f757e85dd40daeee193582a7
SHA13845dc1d3b14eee2eea22af114d53bfd83a9f096
SHA256d33c684cc1a27d86a76b7b28ec52307ac8421a51639a055957b8c5eaa61864f4
SHA512624cdaa99dedcc14c94768180918d408c55a07ad7d99f677f53b5ddbaff710fb23be608d8d87796797ad203a802ff29812d9ae58c6cf1d28de3e9bf59bd78df6
-
Filesize
39KB
MD585feee634a6aee90f0108e26d3d9bc1f
SHA1a7b1fa32fe7ed67bd51dea438f2f767e3fef0ca2
SHA25699c63175504781e9278824d487da082da7c014e99f1024227af164986d3a27c6
SHA512b81a3e1723a5180c5168cd7bb5181c631f4f57c59780bb82a502160b7874777f3eef1ebe1b14f66c97f9f1a4721af13b6fbcdff2045c8563c18b5d12540953ff
-
Filesize
1KB
MD529ce63c3342e3d580da6376232339f9b
SHA1d2a2a81ca84bdef94bc239ec36b3af5cf5def6a3
SHA2563f057456a711a34d0bfb56b42259ffd2172b5a945aaadf5da0c407d03af5bccf
SHA512db6b49fe8648a7d8ef6700c22e9862cb428b43042b471e665c9052508bc71b3b769a13c9f2317b9a73d07a9e35a05b4459153a19a5ed12dc23b52b8cff784ee0