Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 06:49
Static task
static1
Behavioral task
behavioral1
Sample
db9c18d05fd830f2f9e7cc0b5011f44a80277b3e298cee715587e8607542b49c.dll
Resource
win7-20240705-en
General
-
Target
db9c18d05fd830f2f9e7cc0b5011f44a80277b3e298cee715587e8607542b49c.dll
-
Size
800KB
-
MD5
844f37f59e5af38fca800fb75c94a4b9
-
SHA1
8505caf8264a9a1cdd9a6f6cba608ef01e38a2d9
-
SHA256
db9c18d05fd830f2f9e7cc0b5011f44a80277b3e298cee715587e8607542b49c
-
SHA512
7c3130224a823be7271e9489497c979bae68836c3779f0028325a245ff2138ef21870c4d84fb1d7f8943a1bc1f497a2d63d95aeb8bb6a6893ad00fc4d4f55b7d
-
SSDEEP
12288:hBim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:j/nts0Q9K/0ooRQIxAk2wi0N/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3468-3-0x0000000002A50000-0x0000000002A51000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/952-1-0x00007FFC653D0000-0x00007FFC65498000-memory.dmp dridex_payload behavioral2/memory/3468-30-0x0000000140000000-0x00000001400C8000-memory.dmp dridex_payload behavioral2/memory/3468-49-0x0000000140000000-0x00000001400C8000-memory.dmp dridex_payload behavioral2/memory/3468-38-0x0000000140000000-0x00000001400C8000-memory.dmp dridex_payload behavioral2/memory/952-52-0x00007FFC653D0000-0x00007FFC65498000-memory.dmp dridex_payload behavioral2/memory/3368-59-0x00007FFC556A0000-0x00007FFC5576F000-memory.dmp dridex_payload behavioral2/memory/3368-64-0x00007FFC556A0000-0x00007FFC5576F000-memory.dmp dridex_payload behavioral2/memory/3920-75-0x00007FFC556A0000-0x00007FFC55769000-memory.dmp dridex_payload behavioral2/memory/3920-80-0x00007FFC556A0000-0x00007FFC55769000-memory.dmp dridex_payload behavioral2/memory/2284-91-0x00007FFC55660000-0x00007FFC5576E000-memory.dmp dridex_payload behavioral2/memory/2284-95-0x00007FFC55660000-0x00007FFC5576E000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 3368 eudcedit.exe 3920 msra.exe 2284 CameraSettingsUIHost.exe -
Loads dropped DLL 3 IoCs
pid Process 3368 eudcedit.exe 3920 msra.exe 2284 CameraSettingsUIHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jdvukccvumb = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\in\\msra.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CameraSettingsUIHost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 952 rundll32.exe 952 rundll32.exe 952 rundll32.exe 952 rundll32.exe 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3468 Process not Found Token: SeCreatePagefilePrivilege 3468 Process not Found Token: SeShutdownPrivilege 3468 Process not Found Token: SeCreatePagefilePrivilege 3468 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3468 Process not Found 3468 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4076 3468 Process not Found 93 PID 3468 wrote to memory of 4076 3468 Process not Found 93 PID 3468 wrote to memory of 3368 3468 Process not Found 94 PID 3468 wrote to memory of 3368 3468 Process not Found 94 PID 3468 wrote to memory of 4892 3468 Process not Found 96 PID 3468 wrote to memory of 4892 3468 Process not Found 96 PID 3468 wrote to memory of 3920 3468 Process not Found 97 PID 3468 wrote to memory of 3920 3468 Process not Found 97 PID 3468 wrote to memory of 5108 3468 Process not Found 98 PID 3468 wrote to memory of 5108 3468 Process not Found 98 PID 3468 wrote to memory of 2284 3468 Process not Found 99 PID 3468 wrote to memory of 2284 3468 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db9c18d05fd830f2f9e7cc0b5011f44a80277b3e298cee715587e8607542b49c.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:952
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:4076
-
C:\Users\Admin\AppData\Local\tn5hoAx9\eudcedit.exeC:\Users\Admin\AppData\Local\tn5hoAx9\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3368
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:4892
-
C:\Users\Admin\AppData\Local\IrXwPnBLy\msra.exeC:\Users\Admin\AppData\Local\IrXwPnBLy\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3920
-
C:\Windows\system32\CameraSettingsUIHost.exeC:\Windows\system32\CameraSettingsUIHost.exe1⤵PID:5108
-
C:\Users\Admin\AppData\Local\KkonnwMWp\CameraSettingsUIHost.exeC:\Users\Admin\AppData\Local\KkonnwMWp\CameraSettingsUIHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804KB
MD5e4cf72607890fd63a9930a95813340ef
SHA15a2808e2162f22a4b2d3cf674cd4247bbd85886f
SHA2568dadd487ae3774ea5b37601106862a04364e80e19fe114e6209d176c6425af96
SHA5122965b149d94477cc8a92ddaa54ddca9b3be18810540e21a829701df26e849bd48c2b7693370e135a190726cfa3ce3ac09c4c2725e60818084d32546eaaf04025
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
31KB
MD59e98636523a653c7a648f37be229cf69
SHA1bd4da030e7cf4d55b7c644dfacd26b152e6a14c4
SHA2563bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717
SHA51241966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78
-
Filesize
1.1MB
MD53660cbd919b5a43136d16548b63d26eb
SHA1eccb205871d994919a1c493d5dab494ee2cc56e9
SHA256b224631b0420fe65eeecfbd161189a4de6f2d6dcf9be3470c2c80332363f25bf
SHA5125c0a2053081f6f629d202be2a884dbb8fe122198f8efa0e14d021a7ee529c432ce500d962d1a244b3464369f260ccde7c010f8e37ba4e769d6f806de4cff5e80
-
Filesize
828KB
MD561f2ba6f90d30971d6b4fe4013576390
SHA190a6ca593c47b84d31025a38dc48eb744132082e
SHA256b23574e0f5b911b4dee61f2f74d2416078f13597948433ddc807350c49c1bada
SHA51294b8af5b39ad63e24200d251bc342ae8cb0680d42a652ea5372b6bf4da5cb241693c5d00bb4ba91352323ae024dbf5342cff89d7ccbfdb97132510fd71a79da5
-
Filesize
365KB
MD5a9de6557179d371938fbe52511b551ce
SHA1def460b4028788ded82dc55c36cb0df28599fd5f
SHA25683c8d1a7582b24b4bbc0d453c813487185c2b05c483bd1759ef647a7e7e92dfe
SHA5125790cac8dae16a785b48f790e6645b137f211c1587fb64ea88e743b846ff3a886324afcfef4bebc61f869023b9a22ba925c461dfb2e12497b70f501e6b79153c
-
Filesize
1KB
MD5e1ddb307a33f98d3c896bb8ccf3172b7
SHA11572cc73653cb550e2d7aba6e5eee4ae5d13e63a
SHA256f5f296a522cc6d9bd8c2c58c7953fcf9c8f0644c6b410d484e2338a0124cc73b
SHA51261c45f00b00a85c2b777cca8f76538cac2ebb973087a970e3a51bb3ba89c0c3b447c5c8fa209427ed02309bbf4269f309eea9433458f780520a1a76a22453ceb