Overview
overview
10Static
static
10Dropper/Berbew.exe
windows10-1703-x64
10Dropper/Berbew.exe
windows10-2004-x64
10Dropper/Phorphiex.exe
windows10-1703-x64
10Dropper/Phorphiex.exe
windows10-2004-x64
10RAT/31.exe
windows10-1703-x64
10RAT/31.exe
windows10-2004-x64
10RAT/XClient.exe
windows10-1703-x64
10RAT/XClient.exe
windows10-2004-x64
10RAT/file.exe
windows10-1703-x64
7RAT/file.exe
windows10-2004-x64
7Ransomware...-2.exe
windows10-1703-x64
10Ransomware...-2.exe
windows10-2004-x64
10Ransomware...01.exe
windows10-1703-x64
10Ransomware...01.exe
windows10-2004-x64
10Ransomware...lt.exe
windows10-1703-x64
10Ransomware...lt.exe
windows10-2004-x64
10Stealers/Azorult.exe
windows10-1703-x64
10Stealers/Azorult.exe
windows10-2004-x64
10Stealers/B...on.exe
windows10-1703-x64
10Stealers/B...on.exe
windows10-2004-x64
10Stealers/Dridex.dll
windows10-1703-x64
10Stealers/Dridex.dll
windows10-2004-x64
10Stealers/M..._2.exe
windows10-1703-x64
10Stealers/M..._2.exe
windows10-2004-x64
10Stealers/lumma.exe
windows10-1703-x64
10Stealers/lumma.exe
windows10-2004-x64
10Trojan/BetaBot.exe
windows10-1703-x64
10Trojan/BetaBot.exe
windows10-2004-x64
10Trojan/Smo...er.exe
windows10-1703-x64
10Trojan/Smo...er.exe
windows10-2004-x64
10Resubmissions
03-09-2024 14:02
240903-rb57sazdqf 1003-09-2024 13:51
240903-q59avszclf 1002-09-2024 19:51
240902-yk8gtsxbpd 1002-09-2024 02:27
240902-cxh7tazflg 1002-09-2024 02:26
240902-cwxc2sygll 1021-06-2024 19:37
240621-yca7cszgnd 1009-06-2024 17:07
240609-vm7rjadd73 1013-05-2024 17:36
240513-v6qblafe3y 1012-05-2024 17:17
240512-vty3zafh5s 10Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-06-2024 17:07
Behavioral task
behavioral1
Sample
Dropper/Berbew.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Dropper/Berbew.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Dropper/Phorphiex.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Dropper/Phorphiex.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
RAT/31.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
RAT/31.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
RAT/XClient.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
RAT/XClient.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
RAT/file.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
RAT/file.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Ransomware/Client-2.exe
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
Ransomware/Client-2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Ransomware/criticalupdate01.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
Ransomware/criticalupdate01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Ransomware/default.exe
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
Ransomware/default.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Stealers/Azorult.exe
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
Stealers/Azorult.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Stealers/BlackMoon.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
Stealers/BlackMoon.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Stealers/Dridex.dll
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
Stealers/Dridex.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Stealers/lumma.exe
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
Stealers/lumma.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Trojan/BetaBot.exe
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
Trojan/BetaBot.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Trojan/SmokeLoader.exe
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
Trojan/SmokeLoader.exe
Resource
win10v2004-20240508-en
General
-
Target
Stealers/Dridex.dll
-
Size
1.2MB
-
MD5
304109f9a5c3726818b4c3668fdb71fd
-
SHA1
2eb804e205d15d314e7f67d503940f69f5dc2ef8
-
SHA256
af26296c75ff26f7ee865df424522d75366ae3e2e80d7d9e89ef8c9398b0836d
-
SHA512
cf01fca33392dc40495f4c39eb1fd240b425018c7088ca9782d883bb135b5dd469a11941d0d680a69e881fa95c4147d70fe567aeba7e98ff6adfd5c0ca1a0e01
-
SSDEEP
24576:ZVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:ZV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral21/memory/3332-7-0x0000000000D50000-0x0000000000D51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
BdeUISrv.exeprintfilterpipelinesvc.exepwcreator.exepid process 912 BdeUISrv.exe 652 printfilterpipelinesvc.exe 4440 pwcreator.exe -
Loads dropped DLL 5 IoCs
Processes:
BdeUISrv.exeprintfilterpipelinesvc.exepwcreator.exepid process 912 BdeUISrv.exe 652 printfilterpipelinesvc.exe 652 printfilterpipelinesvc.exe 652 printfilterpipelinesvc.exe 4440 pwcreator.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tfuhhiozesvy = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\0Wws6Q\\printfilterpipelinesvc.exe" -
Processes:
rundll32.exeBdeUISrv.exeprintfilterpipelinesvc.exepwcreator.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA printfilterpipelinesvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pwcreator.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3332 Token: SeCreatePagefilePrivilege 3332 Token: SeShutdownPrivilege 3332 Token: SeCreatePagefilePrivilege 3332 Token: SeShutdownPrivilege 3332 Token: SeCreatePagefilePrivilege 3332 Token: SeShutdownPrivilege 3332 Token: SeCreatePagefilePrivilege 3332 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3332 wrote to memory of 708 3332 BdeUISrv.exe PID 3332 wrote to memory of 708 3332 BdeUISrv.exe PID 3332 wrote to memory of 912 3332 BdeUISrv.exe PID 3332 wrote to memory of 912 3332 BdeUISrv.exe PID 3332 wrote to memory of 224 3332 printfilterpipelinesvc.exe PID 3332 wrote to memory of 224 3332 printfilterpipelinesvc.exe PID 3332 wrote to memory of 652 3332 printfilterpipelinesvc.exe PID 3332 wrote to memory of 652 3332 printfilterpipelinesvc.exe PID 3332 wrote to memory of 3308 3332 pwcreator.exe PID 3332 wrote to memory of 3308 3332 pwcreator.exe PID 3332 wrote to memory of 4440 3332 pwcreator.exe PID 3332 wrote to memory of 4440 3332 pwcreator.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Stealers\Dridex.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:708
-
C:\Users\Admin\AppData\Local\u980bSE5\BdeUISrv.exeC:\Users\Admin\AppData\Local\u980bSE5\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:912
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe1⤵PID:224
-
C:\Users\Admin\AppData\Local\M9d\printfilterpipelinesvc.exeC:\Users\Admin\AppData\Local\M9d\printfilterpipelinesvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:652
-
C:\Windows\system32\pwcreator.exeC:\Windows\system32\pwcreator.exe1⤵PID:3308
-
C:\Users\Admin\AppData\Local\3fG8MPWI\pwcreator.exeC:\Users\Admin\AppData\Local\3fG8MPWI\pwcreator.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
775KB
MD55a9ef500a0436e893542fca5e8876c9c
SHA1bf8f802f67cf5f42ad6375b5159b4b2d8c5759a4
SHA256a0af92d50e18376d996a3bfeb9e43cc8d2ea8385646542ea850c777850d588df
SHA512ffda4df212242e87d399ddcd72fa99b14f0d18abcfdb6c69df65ce345e8c94f2c1fccb323252af5cb18a28abeef0b148c106631ec778a522f82b392c0547fdc8
-
Filesize
1.2MB
MD5f0e87f0b1d33e68a66581664b3c429ff
SHA16a4ac3530949095ae4416cffe6de58204b37019f
SHA25630e56c881dc31da731008a9f0645dcb947608008d6d204989ef0269c72fa5f4f
SHA512c69e99e7711c053c38f6540c9f6e30f16c00bdc9f577aef50189140e85654aed40625e7b73b9288909efdacb0a457e0698ccf144f4b28b34b933a2aac55abdff
-
Filesize
812KB
MD53f759db69d6016c286bd25f10e4b6e0c
SHA1e2243c1e27b9a0b68e550e1775aa75f3bafd5286
SHA256eeb432af61d3157153cc6683ae4ffbb44b306ed0b980911be2891358048dc7c7
SHA51267f0cf128a048139b5ceb0b6fb88498076b60d5822fe807fe1ab0d1856e74096d3625cb824a80066b6a27ae0929c44164fc6e8e56cfc18b04e25ebcd51d948ac
-
Filesize
51KB
MD5bbdabce7ba28eb67c325fa99125d56e0
SHA1332ea58882149d629057e8a8004a48d1bb1d6180
SHA2569c3fe14fc4ab8e385c3baae1d5a04a66c3ee645d278b182039fa45a6c99b4994
SHA512fd3a22baac2689f8e009cb7845aa6ca7dd4a7ba4f1956758945cdd68dfc7045e4da62cf846a4a0b507d9be3753eb68b94fe375bf01dc698017b107ff26ebd93e
-
Filesize
1.2MB
MD5825fb39dda754426572db43c5ba7cef6
SHA1baeeed076da5da30d028b3d8e8a802bc1ba65282
SHA2563e58aab5d5fcaac173f7d096573043b3efbe087a1cee0712d3f60e85236d89b2
SHA512ece294fee1ca35868d2c6f5251eac8d5d824e68ffd3f46774d9520a92b44f1732bf61ccc1b2861ca23fbda99d424d18bbfe70689d4809153b36d363fe3b565d7
-
Filesize
1KB
MD59778b6f5f85d8d9b7bea037e294c472c
SHA1371edd4af4abbc93dcb9a9850433e274cc112454
SHA256ebbcdae2ee4262dfcd0178f851cc87fc281e52bfb098ac8107067bba6209e80a
SHA5125a0890ed335c7c840e226ad393ff948a94006b03dd6b20fd8de145af0c84d06c2bc7f78434be784b87948efeb8e06bd9eb26c747b5d74dd169a8453019f2756b
-
Filesize
1.2MB
MD5825374260e66fcfaea485c3e7dd7b5f4
SHA12469822575c4dba1d75758edc938726f071d09eb
SHA2562dff5b5fbebb7c6f105ba3fa98af1a4038026785ba25f258b377307642252add
SHA5129a473d4d62d73776f935caa0102ea582ad8fd593c10c9bf713ed7142e7958a456b303d247f9e28f2a5458448e65848e5c5d9c57137e14de55a93087c148b39b2