Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
8c1edc294ab7bcaa45a2467817c833c0_NEIKI.dll
Resource
win7-20240419-en
General
-
Target
8c1edc294ab7bcaa45a2467817c833c0_NEIKI.dll
-
Size
1.2MB
-
MD5
8c1edc294ab7bcaa45a2467817c833c0
-
SHA1
84166d264a241b17e0c30e57c8a9029bdefc4448
-
SHA256
a26ebf633120aaf24e733dd3b9a4737d20565d3b8b43edffe548e7bc8e3528c9
-
SHA512
4369e992d268d298c9e7dbf39596f650a5390e6e5f1b3a0e555e11c7f1f0bbaf5bbc056669054aad7dfb2180e66977d3e5d93299699103239abf4dc6214be68a
-
SSDEEP
12288:w38uea4w46+K1FZPfxyMs2SRXTajPomqkpyrJXy6mfvHELWUbxdewWRa7CkhkgjS:K8uea4w467D5/0ypyFYELW8xFZmMXJZ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3580-3-0x0000000000D20000-0x0000000000D21000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/5064-1-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral2/memory/3580-37-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral2/memory/3580-48-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral2/memory/5064-51-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral2/memory/3544-58-0x0000000140000000-0x0000000140184000-memory.dmp dridex_payload behavioral2/memory/3544-62-0x0000000140000000-0x0000000140184000-memory.dmp dridex_payload behavioral2/memory/2200-79-0x0000000140000000-0x0000000140184000-memory.dmp dridex_payload behavioral2/memory/1896-95-0x0000000140000000-0x0000000140184000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
PasswordOnWakeSettingFlyout.exePasswordOnWakeSettingFlyout.exeSystemSettingsRemoveDevice.exepid process 3544 PasswordOnWakeSettingFlyout.exe 2200 PasswordOnWakeSettingFlyout.exe 1896 SystemSettingsRemoveDevice.exe -
Loads dropped DLL 3 IoCs
Processes:
PasswordOnWakeSettingFlyout.exePasswordOnWakeSettingFlyout.exeSystemSettingsRemoveDevice.exepid process 3544 PasswordOnWakeSettingFlyout.exe 2200 PasswordOnWakeSettingFlyout.exe 1896 SystemSettingsRemoveDevice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jrbkpoyx = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\OneNote\\16.0\\mFfv\\PasswordOnWakeSettingFlyout.exe" -
Processes:
rundll32.exePasswordOnWakeSettingFlyout.exePasswordOnWakeSettingFlyout.exeSystemSettingsRemoveDevice.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordOnWakeSettingFlyout.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordOnWakeSettingFlyout.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsRemoveDevice.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5064 rundll32.exe 5064 rundll32.exe 5064 rundll32.exe 5064 rundll32.exe 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 3580 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3580 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3580 wrote to memory of 3092 3580 PasswordOnWakeSettingFlyout.exe PID 3580 wrote to memory of 3092 3580 PasswordOnWakeSettingFlyout.exe PID 3580 wrote to memory of 3544 3580 PasswordOnWakeSettingFlyout.exe PID 3580 wrote to memory of 3544 3580 PasswordOnWakeSettingFlyout.exe PID 3580 wrote to memory of 3596 3580 PasswordOnWakeSettingFlyout.exe PID 3580 wrote to memory of 3596 3580 PasswordOnWakeSettingFlyout.exe PID 3580 wrote to memory of 2200 3580 PasswordOnWakeSettingFlyout.exe PID 3580 wrote to memory of 2200 3580 PasswordOnWakeSettingFlyout.exe PID 3580 wrote to memory of 4320 3580 SystemSettingsRemoveDevice.exe PID 3580 wrote to memory of 4320 3580 SystemSettingsRemoveDevice.exe PID 3580 wrote to memory of 1896 3580 SystemSettingsRemoveDevice.exe PID 3580 wrote to memory of 1896 3580 SystemSettingsRemoveDevice.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c1edc294ab7bcaa45a2467817c833c0_NEIKI.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\PasswordOnWakeSettingFlyout.exeC:\Windows\system32\PasswordOnWakeSettingFlyout.exe1⤵
-
C:\Users\Admin\AppData\Local\WujA\PasswordOnWakeSettingFlyout.exeC:\Users\Admin\AppData\Local\WujA\PasswordOnWakeSettingFlyout.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\PasswordOnWakeSettingFlyout.exeC:\Windows\system32\PasswordOnWakeSettingFlyout.exe1⤵
-
C:\Users\Admin\AppData\Local\IkY3p\PasswordOnWakeSettingFlyout.exeC:\Users\Admin\AppData\Local\IkY3p\PasswordOnWakeSettingFlyout.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemSettingsRemoveDevice.exeC:\Windows\system32\SystemSettingsRemoveDevice.exe1⤵
-
C:\Users\Admin\AppData\Local\ihVD\SystemSettingsRemoveDevice.exeC:\Users\Admin\AppData\Local\ihVD\SystemSettingsRemoveDevice.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\IkY3p\DUI70.dllFilesize
1.5MB
MD5586cdf10343d43cad88408a4b524c601
SHA129a1454e95e93681fdeba48f278ba7744aa5f44f
SHA2568155dbeabd9b2a4c897fddaab04933c8c73192fd9987f307144ae3d6b9d2d1da
SHA512a822cca2cfaa3baa801d9e77f1af354095523f4960cada2ace590eeaf14956fb9f63a12136ae07cb4d49ace1f938b532dc37d4303232ac3e7fce65dfba5d9a95
-
C:\Users\Admin\AppData\Local\WujA\DUI70.dllFilesize
1.5MB
MD50a31d8f802988124f03e0e81ab08fb87
SHA1111eb0c4491d3651c021ddfd1c749f7e35c37c63
SHA256fced3f77f71d2f2845d82b25edcae328da777271e56c12c9e1d850c363c91e02
SHA5120ed282039512b7780fdb389c24ba7e7f56bf0136b8267d5d8e9d254d26344969427d07fb65aeed05caff057dc763c7cff28743fcd4fe64683248fcf739c74a84
-
C:\Users\Admin\AppData\Local\WujA\PasswordOnWakeSettingFlyout.exeFilesize
44KB
MD5591a98c65f624c52882c2b238d6cd4c4
SHA1c960d08c19d777069cf265dcc281807fbd8502d7
SHA2565e6ed524c955fb1ea3e24f132987143da3ec81db5041a0edcfa7bf3ac790eb06
SHA5121999f23c90d85857461f8ddc5342470296f6939a654ac015780c2977f293c1f799fc992462f3d4d9181c97ab960db3291b85ea7c0537edcb57755706b20b6074
-
C:\Users\Admin\AppData\Local\ihVD\DUI70.dllFilesize
1.5MB
MD5ee89699a1ec77ff4b7b909eaac5051c4
SHA1c9aaccd876c7169e19b3186fa3069f98fff134ff
SHA25678f989af6f85dc6237856efcea0b91c226e6cc9f0b13a11dd346cc05feb9e5a9
SHA51238c082e82b2eb8d77a4425927d7cf854eb4d2ffcfe59b0eff79f0ac8ad9c6971e52a8ee35d3e5ef49b117d40d4e7b44ee93858b23b49753a2ec69eb8782da044
-
C:\Users\Admin\AppData\Local\ihVD\SystemSettingsRemoveDevice.exeFilesize
39KB
MD57853f1c933690bb7c53c67151cbddeb0
SHA1d47a1ad0ccba4c988c8ffc5cbf9636fd4f4fa6e6
SHA2569500731b2a3442f11dfd08a8adfe027e7f32ef5834c628eed4b78be74168470d
SHA512831993d610539d44422d769de6561a4622e1b9cb3d73253774b6cecabf57654a74cd88b4ebe20921585ea96d977225b9501f02a0f6a1fc7d2cad6824fd539304
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Xzasfouulwckbw.lnkFilesize
1KB
MD5270e929349554978ab96a56d36024623
SHA131ba936d7a067899e5f031bd84334a2956ed0c44
SHA256f75fc1da960c424b46a6b3d5f76e95bf59769a8367baaee76435db96c67546c7
SHA512e6ce3cd85a51c4eef738077a67c8114a5d9abc988c2ab302a882d6795641266af6d9c0f2c29d0914bc8e7060d493631008b231048280703ca419508b43122873
-
memory/1896-95-0x0000000140000000-0x0000000140184000-memory.dmpFilesize
1.5MB
-
memory/1896-92-0x000002585BEE0000-0x000002585BEE7000-memory.dmpFilesize
28KB
-
memory/2200-79-0x0000000140000000-0x0000000140184000-memory.dmpFilesize
1.5MB
-
memory/2200-76-0x000001FE20D10000-0x000001FE20D17000-memory.dmpFilesize
28KB
-
memory/3544-62-0x0000000140000000-0x0000000140184000-memory.dmpFilesize
1.5MB
-
memory/3544-58-0x0000000140000000-0x0000000140184000-memory.dmpFilesize
1.5MB
-
memory/3544-60-0x000001D077890000-0x000001D077897000-memory.dmpFilesize
28KB
-
memory/3580-38-0x00007FFBF27C0000-0x00007FFBF27D0000-memory.dmpFilesize
64KB
-
memory/3580-7-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-24-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-23-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-22-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-21-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-20-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-18-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-17-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-16-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-15-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-13-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-12-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-11-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-10-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-9-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-8-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-25-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-6-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-5-0x00007FFBF095A000-0x00007FFBF095B000-memory.dmpFilesize
4KB
-
memory/3580-26-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-27-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-3-0x0000000000D20000-0x0000000000D21000-memory.dmpFilesize
4KB
-
memory/3580-48-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-39-0x00007FFBF27B0000-0x00007FFBF27C0000-memory.dmpFilesize
64KB
-
memory/3580-37-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-36-0x0000000000CC0000-0x0000000000CC7000-memory.dmpFilesize
28KB
-
memory/3580-28-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-19-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/3580-14-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/5064-1-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/5064-51-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/5064-2-0x000001E5F62E0000-0x000001E5F62E7000-memory.dmpFilesize
28KB