Overview
overview
10Static
static
10Dropper/Berbew.exe
windows10-2004-x64
10Dropper/Phorphiex.exe
windows10-2004-x64
10out.exe
windows10-2004-x64
3RAT/31.exe
windows10-2004-x64
10RAT/XClient.exe
windows10-2004-x64
10RAT/file.exe
windows10-2004-x64
7Ransomware...-2.exe
windows10-2004-x64
10Ransomware...01.exe
windows10-2004-x64
10Ransomware...lt.exe
windows10-2004-x64
10Stealers/Azorult.exe
windows10-2004-x64
10Stealers/B...on.exe
windows10-2004-x64
10Stealers/Dridex.dll
windows10-2004-x64
10Stealers/M..._2.exe
windows10-2004-x64
10Stealers/lumma.exe
windows10-2004-x64
10Trojan/BetaBot.exe
windows10-2004-x64
10Trojan/Smo...er.exe
windows10-2004-x64
10Resubmissions
03-09-2024 14:02
240903-rb57sazdqf 1003-09-2024 13:51
240903-q59avszclf 1002-09-2024 19:51
240902-yk8gtsxbpd 1002-09-2024 02:27
240902-cxh7tazflg 1002-09-2024 02:26
240902-cwxc2sygll 1021-06-2024 19:37
240621-yca7cszgnd 1009-06-2024 17:07
240609-vm7rjadd73 1013-05-2024 17:36
240513-v6qblafe3y 1012-05-2024 17:17
240512-vty3zafh5s 10Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 02:26
Behavioral task
behavioral1
Sample
Dropper/Berbew.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Dropper/Phorphiex.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
RAT/31.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RAT/XClient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
RAT/file.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Ransomware/Client-2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Ransomware/criticalupdate01.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Ransomware/default.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Stealers/Azorult.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Stealers/BlackMoon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Stealers/Dridex.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Stealers/lumma.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Trojan/BetaBot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
Trojan/SmokeLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
Stealers/Dridex.dll
-
Size
1.2MB
-
MD5
304109f9a5c3726818b4c3668fdb71fd
-
SHA1
2eb804e205d15d314e7f67d503940f69f5dc2ef8
-
SHA256
af26296c75ff26f7ee865df424522d75366ae3e2e80d7d9e89ef8c9398b0836d
-
SHA512
cf01fca33392dc40495f4c39eb1fd240b425018c7088ca9782d883bb135b5dd469a11941d0d680a69e881fa95c4147d70fe567aeba7e98ff6adfd5c0ca1a0e01
-
SSDEEP
24576:ZVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:ZV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral12/memory/3372-4-0x0000000007D00000-0x0000000007D01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2636 wscript.exe 5092 GamePanel.exe 2632 psr.exe -
Loads dropped DLL 4 IoCs
pid Process 2636 wscript.exe 5092 GamePanel.exe 2632 psr.exe 2632 psr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wbdoaalrz = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\AddIns\\TtJHoP4\\GamePanel.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1028 rundll32.exe 1028 rundll32.exe 1028 rundll32.exe 1028 rundll32.exe 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3372 Process not Found Token: SeCreatePagefilePrivilege 3372 Process not Found Token: SeShutdownPrivilege 3372 Process not Found Token: SeCreatePagefilePrivilege 3372 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3372 Process not Found 3372 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3372 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2704 3372 Process not Found 94 PID 3372 wrote to memory of 2704 3372 Process not Found 94 PID 3372 wrote to memory of 2636 3372 Process not Found 95 PID 3372 wrote to memory of 2636 3372 Process not Found 95 PID 3372 wrote to memory of 2764 3372 Process not Found 96 PID 3372 wrote to memory of 2764 3372 Process not Found 96 PID 3372 wrote to memory of 5092 3372 Process not Found 97 PID 3372 wrote to memory of 5092 3372 Process not Found 97 PID 3372 wrote to memory of 944 3372 Process not Found 98 PID 3372 wrote to memory of 944 3372 Process not Found 98 PID 3372 wrote to memory of 2632 3372 Process not Found 99 PID 3372 wrote to memory of 2632 3372 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Stealers\Dridex.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵PID:2704
-
C:\Users\Admin\AppData\Local\aCa7z\wscript.exeC:\Users\Admin\AppData\Local\aCa7z\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2636
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵PID:2764
-
C:\Users\Admin\AppData\Local\VCSl\GamePanel.exeC:\Users\Admin\AppData\Local\VCSl\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5092
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:944
-
C:\Users\Admin\AppData\Local\zsyaV\psr.exeC:\Users\Admin\AppData\Local\zsyaV\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
Filesize
1.2MB
MD573d3deba31eeb84c58aadf7ca27914dc
SHA1e01f5b8f99f814b288f3002bb611c17f81b6ae41
SHA256771b0b34023385153c23a970808a8f940005db06a52a10b906be25bd6295d78c
SHA512a3deb8a389035b414c3c1117b800fed36e9b6f811200e8981618b50f1c88ecbd25f75cdfd4b1fa19f78b4e5f776f1a9074c468fefd0ecb02eaa1b4302538acaa
-
Filesize
1.2MB
MD52082bb8de97db19e8e7c70f1c582d61e
SHA1adce0238e2e4fc321f31a0d02ad5d4c2e328cfad
SHA256fa8edb179179109a9c81db84d608247e78b97509ffff4890ef45f3994764a637
SHA512808eb3e56f129cbd6f5c7a2cb469642c46c90eb08ae0098849a3cfa8958d3569b2eac089b675e2b64e5f47b73bc4db332f93f77e17e5432fef48b528023b3830
-
Filesize
166KB
MD5a47cbe969ea935bdd3ab568bb126bc80
SHA115f2facfd05daf46d2c63912916bf2887cebd98a
SHA25634008e2057df8842df210246995385a0441dc1e081d60ad15bd481e062e7f100
SHA512f5c81e6dc4d916944304fc85136e1ff6dee29a21e50a54fe6280a475343eccbfe094171d62475db5f38e07898c061126158c34d48b9d8f4f57f76d49e564e3fc
-
Filesize
1.2MB
MD5f59fe94ffafde622e8a60653ef4fb5ee
SHA19edef60427c8bd8a45f50dc81887e57fc8745120
SHA25661d9bdb8698f77faf91da157b20872d0126ae14472dcadf321e8c86e15d190df
SHA5120afb4c2aa4f8bf093dcb83e1c16c32360fbc6064c24d6e47376bd56fca56845a4fc86c7115434c48dc64f9ae7a5e099d817270c4b9c1ab5f57e4c8a3b5e847ae
-
Filesize
232KB
MD5ad53ead5379985081b7c3f1f357e545a
SHA16f5aa32c1d15fbf073558fadafd046d97b60184e
SHA2564f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f
SHA512433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0
-
Filesize
1KB
MD515f3e7c3359c18977e817980326539f9
SHA1f3666ee4b25f2955ab93a520d69c656128bc0c27
SHA256acef460d8b035261643afee54a9536029bfb72cdcec2876e08a0e756c201f5cd
SHA5122c6616ff768462bfb4cb50e5f937540154d3f57afc09544046329991aa877c711ddfd57ebcdecf00c848aeaa08105648aa04902fd1e547b85fb334dcd67d5fd3