Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
c68637d8f73c08e90207227784560ee2b64bdc78527e58aeee66d780915cedb4.dll
Resource
win7-20240221-en
General
-
Target
c68637d8f73c08e90207227784560ee2b64bdc78527e58aeee66d780915cedb4.dll
-
Size
1.7MB
-
MD5
1b27f30b823c59968581b70c08e55337
-
SHA1
c3f4fa24983e341b0bfeb31c53189a87e1145c86
-
SHA256
c68637d8f73c08e90207227784560ee2b64bdc78527e58aeee66d780915cedb4
-
SHA512
55a7f0686786f8e735f5eaa150a1f5dedb8fbad662892ce71fa950e1160966b7f5bfb8827eab3a46d9f20abf0a6ea89f3c33da9bb55c07ca6310ab5aab4dca29
-
SSDEEP
12288:yVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1q:vfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1176-5-0x0000000002210000-0x0000000002211000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdrleakdiag.exefveprompt.exeMpSigStub.exepid process 2900 rdrleakdiag.exe 1632 fveprompt.exe 1460 MpSigStub.exe -
Loads dropped DLL 7 IoCs
Processes:
rdrleakdiag.exefveprompt.exeMpSigStub.exepid process 1176 2900 rdrleakdiag.exe 1176 1632 fveprompt.exe 1176 1460 MpSigStub.exe 1176 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\LIHBIU~1\\FVEPRO~1.EXE" -
Processes:
rundll32.exerdrleakdiag.exefveprompt.exeMpSigStub.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdrleakdiag.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MpSigStub.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1176 wrote to memory of 2336 1176 rdrleakdiag.exe PID 1176 wrote to memory of 2336 1176 rdrleakdiag.exe PID 1176 wrote to memory of 2336 1176 rdrleakdiag.exe PID 1176 wrote to memory of 2900 1176 rdrleakdiag.exe PID 1176 wrote to memory of 2900 1176 rdrleakdiag.exe PID 1176 wrote to memory of 2900 1176 rdrleakdiag.exe PID 1176 wrote to memory of 1480 1176 fveprompt.exe PID 1176 wrote to memory of 1480 1176 fveprompt.exe PID 1176 wrote to memory of 1480 1176 fveprompt.exe PID 1176 wrote to memory of 1632 1176 fveprompt.exe PID 1176 wrote to memory of 1632 1176 fveprompt.exe PID 1176 wrote to memory of 1632 1176 fveprompt.exe PID 1176 wrote to memory of 2768 1176 MpSigStub.exe PID 1176 wrote to memory of 2768 1176 MpSigStub.exe PID 1176 wrote to memory of 2768 1176 MpSigStub.exe PID 1176 wrote to memory of 1460 1176 MpSigStub.exe PID 1176 wrote to memory of 1460 1176 MpSigStub.exe PID 1176 wrote to memory of 1460 1176 MpSigStub.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c68637d8f73c08e90207227784560ee2b64bdc78527e58aeee66d780915cedb4.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
C:\Windows\system32\rdrleakdiag.exeC:\Windows\system32\rdrleakdiag.exe1⤵PID:2336
-
C:\Users\Admin\AppData\Local\ZYhtOG\rdrleakdiag.exeC:\Users\Admin\AppData\Local\ZYhtOG\rdrleakdiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2900
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵PID:1480
-
C:\Users\Admin\AppData\Local\PhUKoqsZ\fveprompt.exeC:\Users\Admin\AppData\Local\PhUKoqsZ\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1632
-
C:\Windows\system32\MpSigStub.exeC:\Windows\system32\MpSigStub.exe1⤵PID:2768
-
C:\Users\Admin\AppData\Local\URlj\MpSigStub.exeC:\Users\Admin\AppData\Local\URlj\MpSigStub.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc
-
Filesize
1.7MB
MD50d80e6916c2bedac9ba8c9cb3148cacc
SHA19a5a77c8922129f6015ae8c6e4922219758f24cc
SHA256cd50a42b0dffde815cccef40972504c8828bda95cc6b3bc548c54c9b5059e7e1
SHA512c0bbfcbb2417340fd7c5073f029089da7633cc56a96f70315b60bae81d0d71ec7176c2798af6281e6a33c3a93b0d7b7dbbaff15cf051d934b66d9f42c37f65ec
-
Filesize
264KB
MD52e6bd16aa62e5e95c7b256b10d637f8f
SHA1350be084477b1fe581af83ca79eb58d4defe260f
SHA256d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3
SHA5121f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542
-
Filesize
1.7MB
MD516fb505531cf4ffae6d3d9a7531d9b6d
SHA1a340382d26d90779da402ca49796f387e301acf5
SHA2568c35239f7e3ff05a8cc636dd1b9ed8ce647f8072ddf44e662935411b4620f21e
SHA51274e597aceafcb9076da2b2fb90423b68b76c0f0e7235b86c97a858f718e5ab304e20ce965924840a26dfe4be558ff7856e894294399ce3325e2e4d74268c91d2
-
Filesize
39KB
MD55e058566af53848541fa23fba4bb5b81
SHA1769ce3bfc45e4d56ed01dbeeeca7be22f9b9eed6
SHA256ae83b050fa722da7e4b19fc3d534f0126b1ec055643bb1f267b85b55160f4409
SHA512352029cf0af7583a4c525cfd1da7467446bac410a885b2768d8052f39577ccce85b21d5bd946be6bf8341e7308c8e4f645e4d79232b93aaf6a92d6cd55f598d0
-
Filesize
1KB
MD5126ecf7c2aa65055d818f2f31deb3163
SHA13e05916c39ab180013e30d534e924cfa7094e055
SHA256cddd836e2b061137c5f453f0612a88fd05706a72f63051b9db3ad014fed3f21e
SHA5128d5602a4c22ed8daca289bad3b567f8be0e3fb2a8ea2665320b5369aa2a63434b763abeb12c1731125c1d409b0abe8ccda222dea367f2e5fb450570e06ffc18a
-
Filesize
1.7MB
MD5d840ccc578a1d997a908ec619706b8a2
SHA19cc683dbb3a9167deee6fe5fde808367b9cc711b
SHA2569f491d74d8f8873646c3909327840f47a35624cbcd10618c51bbf72bf9aa10a8
SHA5122aacd4639af844408fc46bf665991daddf2a3f505e9e87b2c439c1b068a1391de3f4d5ba51316e7bdb6f685eaf6d3a28240a72d21c893eacb7c91040245fe531