Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win64.Dridex.ASFS.dll
Resource
win7-20240903-en
General
-
Target
Trojan.Win64.Dridex.ASFS.dll
-
Size
1.8MB
-
MD5
0911f9a26ce4142acbb04da26b9d54f0
-
SHA1
6e443ef54eb8b28725f0717cba6ccdc03d66ba77
-
SHA256
98f5cbef3bae29cbc52bcb0224d5964f69ab793f2296a6954e68ffdf26636d8f
-
SHA512
bc42593e5dc3c2dd52f45ff292db1eab892cf53b158f3018e6a6e2795e47f01700c80b85b5297e9541c2c6e5a3317d5325d84f99b8b82ec3780f049350b9ece6
-
SSDEEP
24576:y6UQsIUK6eiyaJt2TlBuWA+ypYKLDGxaaxg1qpRai:nUQsIUK6eiyaJYTlBQ+mxH9au1eRai
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1184-4-0x0000000002520000-0x0000000002521000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2540-0-0x0000000140000000-0x00000001401CA000-memory.dmp dridex_payload behavioral1/memory/1184-32-0x0000000140000000-0x00000001401CA000-memory.dmp dridex_payload behavioral1/memory/1184-40-0x0000000140000000-0x00000001401CA000-memory.dmp dridex_payload behavioral1/memory/1184-39-0x0000000140000000-0x00000001401CA000-memory.dmp dridex_payload behavioral1/memory/2540-48-0x0000000140000000-0x00000001401CA000-memory.dmp dridex_payload behavioral1/memory/2756-57-0x0000000140000000-0x00000001401CB000-memory.dmp dridex_payload behavioral1/memory/2756-62-0x0000000140000000-0x00000001401CB000-memory.dmp dridex_payload behavioral1/memory/2720-79-0x0000000140000000-0x00000001401CB000-memory.dmp dridex_payload behavioral1/memory/1880-95-0x0000000140000000-0x00000001401CB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2756 dccw.exe 2720 slui.exe 1880 wisptis.exe -
Loads dropped DLL 7 IoCs
pid Process 1184 Process not Found 2756 dccw.exe 1184 Process not Found 2720 slui.exe 1184 Process not Found 1880 wisptis.exe 1184 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\FLASHP~1\\sys\\MRiPNzu\\slui.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wisptis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 rundll32.exe 2540 rundll32.exe 2540 rundll32.exe 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2644 1184 Process not Found 30 PID 1184 wrote to memory of 2644 1184 Process not Found 30 PID 1184 wrote to memory of 2644 1184 Process not Found 30 PID 1184 wrote to memory of 2756 1184 Process not Found 31 PID 1184 wrote to memory of 2756 1184 Process not Found 31 PID 1184 wrote to memory of 2756 1184 Process not Found 31 PID 1184 wrote to memory of 988 1184 Process not Found 33 PID 1184 wrote to memory of 988 1184 Process not Found 33 PID 1184 wrote to memory of 988 1184 Process not Found 33 PID 1184 wrote to memory of 2720 1184 Process not Found 34 PID 1184 wrote to memory of 2720 1184 Process not Found 34 PID 1184 wrote to memory of 2720 1184 Process not Found 34 PID 1184 wrote to memory of 1908 1184 Process not Found 35 PID 1184 wrote to memory of 1908 1184 Process not Found 35 PID 1184 wrote to memory of 1908 1184 Process not Found 35 PID 1184 wrote to memory of 1880 1184 Process not Found 36 PID 1184 wrote to memory of 1880 1184 Process not Found 36 PID 1184 wrote to memory of 1880 1184 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Trojan.Win64.Dridex.ASFS.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵PID:2644
-
C:\Users\Admin\AppData\Local\I01Ko00P\dccw.exeC:\Users\Admin\AppData\Local\I01Ko00P\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2756
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:988
-
C:\Users\Admin\AppData\Local\UweTWaB\slui.exeC:\Users\Admin\AppData\Local\UweTWaB\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2720
-
C:\Windows\system32\wisptis.exeC:\Windows\system32\wisptis.exe1⤵PID:1908
-
C:\Users\Admin\AppData\Local\MXo\wisptis.exeC:\Users\Admin\AppData\Local\MXo\wisptis.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5a63b286fcd831bc0b9673a654eb33f6a
SHA114a224a2c21911f8ded3e328b1a5dccafc57d4a8
SHA25678ba08a3e4752071c4a11619e191bc14aea25bf552736f0909f11f24f64ec9b7
SHA512e2e79d743dc10eb20b5c67bd5b536cb11b37d4ef26a7136f8471997d1b2e7a8a576e4520075500b4618beadc30dfc3719dc401ec23ca6313d95fc24f615ac766
-
Filesize
1.8MB
MD529caa94f7df8448817dd7743717cee8b
SHA18eb78929a621fc4850bc0e41875ec73395f08e54
SHA2565cfd3dd8f7a3b72f491158678775bee1124f2b05aab73b60328bad8071fe631a
SHA5128da01c5fcd5255adbefba8422211dc1f35be6634377e7563d9a95e50839da112ceec184eebf7d78d423217bce8aa2068a77c7a2bb37c8bf6c1143c22e6a5371c
-
Filesize
1.8MB
MD5d4957d98e0898efb715b046f73288439
SHA15d7479e3f4c2be0c14018325954aaf88c44403c1
SHA256bcf9f076320c0c4c5717d6723636c0d942f6b27c650d1d203faf0db026b8b18b
SHA5122b36b629d480076443f34f3fed7014bc51dadb456894cf0758c9bcea58ccf8d56f3679c87d1e09bf0b6b5b6282937780a12161e19ab75326dd4240ba9d0d90cf
-
Filesize
1KB
MD5a9bf460e58a56f677d3df4a92dd8bcfb
SHA1868a182e316a2736f7201de816ada37ffc75db25
SHA256b43a214f0dfcb778b0d7d0b5c2117ad77d204f586752859d6142a69c9355c6ae
SHA51229c3b503d580d9ae56fd461d6f53c9ace573f21545cbe9786da9ff470505126d49e2446a18409e3e9ec03d123c9cd70e2e48f256da3be326ab3402bd5f4138e6
-
Filesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
Filesize
396KB
MD502e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c