Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
NoThreatDetectedddc50ab4f6757dd5480e6aa78969bc0b5cd646742b59bd90855436618a44ebbdN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NoThreatDetectedddc50ab4f6757dd5480e6aa78969bc0b5cd646742b59bd90855436618a44ebbdN.dll
Resource
win10v2004-20240802-en
General
-
Target
NoThreatDetectedddc50ab4f6757dd5480e6aa78969bc0b5cd646742b59bd90855436618a44ebbdN.dll
-
Size
1.8MB
-
MD5
e14d296a8d3172360c2d73bd3baab2b0
-
SHA1
0898ae4f9a6926d308a1e24e7f7a2fab85580541
-
SHA256
ddc50ab4f6757dd5480e6aa78969bc0b5cd646742b59bd90855436618a44ebbd
-
SHA512
1874fce4ac65204917ba183d5eb10ae607f9403b3a878f1bc402c80b36959e2cc71fc49f8115710d1a76d07efa5e2bc39429d075d9b4c5c517121add23a23856
-
SSDEEP
12288:PxE0waBckFdlxVRZ1hcyknDb3PTdcGvnx10k2d2Y6q2mQpxVOa:ZZLVJxVHfcLnDTZcG/xmk2d2qZwq
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3440-4-0x0000000002350000-0x0000000002351000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/1384-2-0x00007FFABB2F0000-0x00007FFABB4BF000-memory.dmp dridex_payload behavioral2/memory/3440-32-0x0000000140000000-0x00000001401CF000-memory.dmp dridex_payload behavioral2/memory/3440-40-0x0000000140000000-0x00000001401CF000-memory.dmp dridex_payload behavioral2/memory/3440-51-0x0000000140000000-0x00000001401CF000-memory.dmp dridex_payload behavioral2/memory/1384-54-0x00007FFABB2F0000-0x00007FFABB4BF000-memory.dmp dridex_payload behavioral2/memory/4132-61-0x00007FFAAB800000-0x00007FFAAB9D0000-memory.dmp dridex_payload behavioral2/memory/4132-66-0x00007FFAAB800000-0x00007FFAAB9D0000-memory.dmp dridex_payload behavioral2/memory/1304-82-0x00007FFAAB800000-0x00007FFAAB9D0000-memory.dmp dridex_payload behavioral2/memory/1100-93-0x00007FFAAB4A0000-0x00007FFAAB670000-memory.dmp dridex_payload behavioral2/memory/1100-97-0x00007FFAAB4A0000-0x00007FFAAB670000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 4132 shrpubw.exe 1304 ie4ushowIE.exe 1100 osk.exe -
Loads dropped DLL 3 IoCs
pid Process 4132 shrpubw.exe 1304 ie4ushowIE.exe 1100 osk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Daamvycbobhd = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\Keys\\8qpxQ2PRC6I\\ie4ushowIE.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4ushowIE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1384 rundll32.exe 1384 rundll32.exe 1384 rundll32.exe 1384 rundll32.exe 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3440 wrote to memory of 2676 3440 Process not Found 97 PID 3440 wrote to memory of 2676 3440 Process not Found 97 PID 3440 wrote to memory of 4132 3440 Process not Found 98 PID 3440 wrote to memory of 4132 3440 Process not Found 98 PID 3440 wrote to memory of 2800 3440 Process not Found 99 PID 3440 wrote to memory of 2800 3440 Process not Found 99 PID 3440 wrote to memory of 1304 3440 Process not Found 100 PID 3440 wrote to memory of 1304 3440 Process not Found 100 PID 3440 wrote to memory of 1520 3440 Process not Found 101 PID 3440 wrote to memory of 1520 3440 Process not Found 101 PID 3440 wrote to memory of 1100 3440 Process not Found 102 PID 3440 wrote to memory of 1100 3440 Process not Found 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NoThreatDetectedddc50ab4f6757dd5480e6aa78969bc0b5cd646742b59bd90855436618a44ebbdN.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=1044 /prefetch:81⤵PID:4680
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵PID:2676
-
C:\Users\Admin\AppData\Local\pmLzs3ra\shrpubw.exeC:\Users\Admin\AppData\Local\pmLzs3ra\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4132
-
C:\Windows\system32\ie4ushowIE.exeC:\Windows\system32\ie4ushowIE.exe1⤵PID:2800
-
C:\Users\Admin\AppData\Local\CoNwJNWdy\ie4ushowIE.exeC:\Users\Admin\AppData\Local\CoNwJNWdy\ie4ushowIE.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1304
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵PID:1520
-
C:\Users\Admin\AppData\Local\rWzWj\osk.exeC:\Users\Admin\AppData\Local\rWzWj\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5bbf7689d58bda6298324b054cbe3a1cb
SHA179d00ba0e6aaa686e37b90affe3ef91c5eefda97
SHA2565a8c86eeac979ff79bc3dcdb4b50ffb88c4cbc31a5fa14e869125ff346e5ef87
SHA51234995b5567dca8d9e8b84b22c76e8072279e839290beb69376814b48aebb6bb9676eb944210b7789660dc38444295324691a0a5e9273d6b3c0a64a7baa778498
-
Filesize
76KB
MD59de952f476abab0cd62bfd81e20a3deb
SHA1109cc4467b78dad4b12a3225020ea590bccee3e6
SHA256e9cb6336359ac6f71ac75af2836efb28daa3bafd10a1f0b775dcdc2ec8850a6b
SHA5123cbe50a146ca50b0657a78a2d89a34630c69823005668906785b2d2015cc6139c8dbbf7aefa5fe55957ef55ae06e758933b3b41eaf822e49dba3b7700582e2c9
-
Filesize
1.8MB
MD571f1e90d6bbe943d01b46f2555da9bee
SHA11b1b7cf87084e7f4c126273ae0082387e93d04ae
SHA25615d5cf3d3d79a7ed7bc9a8c824eb483ee29d87de968cb9bbcf5d38785ea8ae35
SHA51264d2fddbe89d10011b2997bc2b2a226ea58d4aff9764d352c0cde70ffdc9bf225505cdc42a029cf9731b58ca75bd8aeb5908aee1d6f6e18e947c29ce3f3d79e3
-
Filesize
59KB
MD59910d5c62428ec5f92b04abf9428eec9
SHA105f27d7515e8ae1fa3bc974ec65b864ec4c9ac8b
SHA2566b84e6e55d8572d7edf0b6243d00abb651fcb0cddddac8461de5f9bb80035a2e
SHA51201be043f7ff879a683e53962eec58456ba200d6787ea66581bb62669ae65d5e58a5577cdf23441165f7a535fce1dec933e3ad2465c72172b4a1488b24ce722cb
-
Filesize
1.8MB
MD555e8af491b985585e914e31f209f5e0e
SHA15c55bc22204cf6c1a4f9687ee83b50ec63bfb989
SHA2561319142429f9abdc21db8b364d79f166e7638a1158f81f91f046797efca9f4db
SHA51297183d9deba516c5aab5e0c30bc352d09b9fee9fa0db067f4c1c79d24735642c9907bab3874c8fd6e01dbd36b3a747b6668392933c4127d40976664af63353f6
-
Filesize
638KB
MD5745f2df5beed97b8c751df83938cb418
SHA12f9fc33b1bf28e0f14fd75646a7b427ddbe14d25
SHA256f67ef6e31fa0eaed44bfbab5b908be06b56cbc7d5a16ab2a72334d91f2bb6a51
SHA5122125d021e6f45a81bd75c9129f4b098ad9aa15c25d270051f4da42458a9737bff44d6adf17aa1f2547715d159fb621829f7cd3b9d42f1521c919549cc7deb228
-
Filesize
1KB
MD58d82da2d8e3bb05949e661388421e3f9
SHA1e23cfbaba2d280f491680d5fdfd0658c4e676a7d
SHA256ff1bbd91d11275b481aa5781cfbdc13891159ea43068edea35ddfad1433992c2
SHA5129a20c2875e21631ce3011fc6f777780e93fb264fcb73d073c9de2c97f1e6f681d534e40ba6204f5091ba79a3ba311697f918f13ddfb463203b905e2a2ca59718