Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
7c3a8e39caaba9e165b6efabcc252390N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c3a8e39caaba9e165b6efabcc252390N.dll
Resource
win10v2004-20240802-en
General
-
Target
7c3a8e39caaba9e165b6efabcc252390N.dll
-
Size
1.2MB
-
MD5
7c3a8e39caaba9e165b6efabcc252390
-
SHA1
60d37686a60274736af35b4c2b925d02fe78b551
-
SHA256
95e951126f8b7bbc7efe78abad5a9d6db1a53675843cb48847377b8cbfbdc67f
-
SHA512
e08a4c05041bbc83772e31d472547ee0ddb0c246e9eaa271952d40410cc8a573b920e7d1375d6708598a3b7ca9846b152466d4451bc16a3555ea36c84679f66d
-
SSDEEP
12288:mZgJtlQepQn+NDo7nIgegQCLDF/B9wvj/cLvVZFuw:mZK6F7nVeRmDFJivohZFV
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1212-5-0x0000000002DF0000-0x0000000002DF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1684 RDVGHelper.exe 688 SystemPropertiesComputerName.exe 1036 rstrui.exe -
Loads dropped DLL 7 IoCs
pid Process 1212 Process not Found 1684 RDVGHelper.exe 1212 Process not Found 688 SystemPropertiesComputerName.exe 1212 Process not Found 1036 rstrui.exe 1212 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcbsdqtxprcnbm = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\PTfRcZp\\SYSTEM~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 rundll32.exe 2696 rundll32.exe 2696 rundll32.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1684 RDVGHelper.exe 1684 RDVGHelper.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 688 SystemPropertiesComputerName.exe 688 SystemPropertiesComputerName.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2748 1212 Process not Found 30 PID 1212 wrote to memory of 2748 1212 Process not Found 30 PID 1212 wrote to memory of 2748 1212 Process not Found 30 PID 1212 wrote to memory of 1684 1212 Process not Found 31 PID 1212 wrote to memory of 1684 1212 Process not Found 31 PID 1212 wrote to memory of 1684 1212 Process not Found 31 PID 1212 wrote to memory of 1620 1212 Process not Found 32 PID 1212 wrote to memory of 1620 1212 Process not Found 32 PID 1212 wrote to memory of 1620 1212 Process not Found 32 PID 1212 wrote to memory of 688 1212 Process not Found 33 PID 1212 wrote to memory of 688 1212 Process not Found 33 PID 1212 wrote to memory of 688 1212 Process not Found 33 PID 1212 wrote to memory of 2824 1212 Process not Found 34 PID 1212 wrote to memory of 2824 1212 Process not Found 34 PID 1212 wrote to memory of 2824 1212 Process not Found 34 PID 1212 wrote to memory of 1036 1212 Process not Found 35 PID 1212 wrote to memory of 1036 1212 Process not Found 35 PID 1212 wrote to memory of 1036 1212 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c3a8e39caaba9e165b6efabcc252390N.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵PID:2748
-
C:\Users\Admin\AppData\Local\EKVqX\RDVGHelper.exeC:\Users\Admin\AppData\Local\EKVqX\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵PID:1620
-
C:\Users\Admin\AppData\Local\XHt\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\XHt\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:688
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:2824
-
C:\Users\Admin\AppData\Local\8Q7IL4sp\rstrui.exeC:\Users\Admin\AppData\Local\8Q7IL4sp\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5477623f520eae87fea2ec6b3bca368cf
SHA1b46265f7fe521632d492d6dd386c22f157312ee0
SHA256afbca36295a67a411bbdeb6c7ec78ca8a7ae9dbe429d6bc1e3d1a0d9eac25a1f
SHA5128ed6b5b67d0b6032bc6497cae99756c970b7f24109423beffa5d27146247cce67c066faa10f336f39c07d542ac2450911513519048aa362a8a0e7011985f3492
-
Filesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
Filesize
1.2MB
MD5593fef5814bf41c18fb16f25fd32ef93
SHA1dde910bdb3d180e35d89204235c45a0884b84a66
SHA25623aff0e00854cb23e95f00d83237357dee740bfb7fdee0a07d6522f465bb7d07
SHA512ab96d854ef13677c255911d8be67a63fc0cd4f94c31c5646b95830901ff7ae619b7e3de72607678f1a1ada3cd357d652f8407a97c43eaa8e814821361b35dfa1
-
Filesize
899B
MD52e55162794be907f0d94ff83b623f85a
SHA147f80c811df98c179fd487c26dac46bbd733381b
SHA256a0625cd8315f435c8056e641a586808ccebee614baf381496e159428b846cce4
SHA512d31c2df12ae2e88cc765b8323126ab635d7e7d49d9bac9b2e59a27d2e5fc5c068f251815ba34ff262c47ea967ef5e1a6ec5b529ca2ce17f28a7d5db67e5086e3
-
Filesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
Filesize
1.2MB
MD59da91652e10f45dd8a865394dd0156dd
SHA1184fca5e26d296c3ca4d0cc4b0c7e95d72495195
SHA2564adf7bc79b81388145ce6dd3e91eadd7efcd190b30950a37f3bfcfd15125ab74
SHA512e6b6a2cd65e8f3db918ac47cd4e0a6ba11e09eb58a348dc8f323711d687aa153864097e90011e35fa08cefba35de96c4d903c049b084896b0bed8446c7d46cc5
-
Filesize
80KB
MD5bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026