Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
d8f78241f9e732ff57f1f307c99d7e27796829927283172653634470ab9b90aaN.dll
Resource
win7-20240903-en
General
-
Target
d8f78241f9e732ff57f1f307c99d7e27796829927283172653634470ab9b90aaN.dll
-
Size
900KB
-
MD5
338b828676d1d088ed1bd3a335e9b780
-
SHA1
4bc3d044e35d9953a71ac426c212b6a3c9de509c
-
SHA256
d8f78241f9e732ff57f1f307c99d7e27796829927283172653634470ab9b90aa
-
SHA512
f4f97fcba6d28aad4cc05408cb97e96603b6cab093317457cf72a4c2474114d7dfbb85e0b1f381e1a56c55221db7f4d1cec54e846c31349258f4dd72e0d702e3
-
SSDEEP
12288:MGVNJAvuPFUl/faxmVlBLXKCgFfEK7JRLeHlX//ve7Y:t3JAvRl/fKQKCgFfx4P/vaY
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3536-5-0x00000000007C0000-0x00000000007C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
FileHistory.exerdpshell.exewermgr.exepid Process 2124 FileHistory.exe 324 rdpshell.exe 3716 wermgr.exe -
Loads dropped DLL 3 IoCs
Processes:
FileHistory.exerdpshell.exewermgr.exepid Process 2124 FileHistory.exe 324 rdpshell.exe 3716 wermgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zsovh = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\xtATMl\\rdpshell.exe" -
Processes:
rundll32.exeFileHistory.exerdpshell.exewermgr.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FileHistory.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wermgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 3536 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exeFileHistory.exerdpshell.exewermgr.exepid Process 1148 rundll32.exe 3536 2124 FileHistory.exe 324 rdpshell.exe 3716 wermgr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3536 wrote to memory of 5024 3536 82 PID 3536 wrote to memory of 5024 3536 82 PID 3536 wrote to memory of 2124 3536 83 PID 3536 wrote to memory of 2124 3536 83 PID 3536 wrote to memory of 2364 3536 84 PID 3536 wrote to memory of 2364 3536 84 PID 3536 wrote to memory of 324 3536 85 PID 3536 wrote to memory of 324 3536 85 PID 3536 wrote to memory of 4000 3536 86 PID 3536 wrote to memory of 4000 3536 86 PID 3536 wrote to memory of 3716 3536 87 PID 3536 wrote to memory of 3716 3536 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8f78241f9e732ff57f1f307c99d7e27796829927283172653634470ab9b90aaN.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1148
-
C:\Windows\system32\FileHistory.exeC:\Windows\system32\FileHistory.exe1⤵PID:5024
-
C:\Users\Admin\AppData\Local\wwC2k\FileHistory.exeC:\Users\Admin\AppData\Local\wwC2k\FileHistory.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:2124
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:2364
-
C:\Users\Admin\AppData\Local\WdSwS083C\rdpshell.exeC:\Users\Admin\AppData\Local\WdSwS083C\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:324
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe1⤵PID:4000
-
C:\Users\Admin\AppData\Local\zz9Odoi\wermgr.exeC:\Users\Admin\AppData\Local\zz9Odoi\wermgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD530a244ca7e492084b9482b10bb3a63ab
SHA13edaede013fc971f8adead68cdc6146fc2bf80e3
SHA25676f51ea464c1047aebd1386705685b3f201b2ba8c856a7381817335b7290667b
SHA5127696eb3f835f1b376f19e0229fd77906cdd3ffb4f49ee0e03d51eab39ab9d5346efab628d488d310af03c311b63f1375e55e00099cb2f1046c9fc940d9a8f3e8
-
Filesize
468KB
MD5428066713f225bb8431340fa670671d4
SHA147f6878ff33317c3fc09c494df729a463bda174c
SHA256da6c395a2018d3439ad580a19e6a1ca5ff29ef9074411ee9f9f1b0a6365dfebd
SHA512292aad2762ae4dc519c69411aa114a29894f60ffac103813db4946f2fac4f5a166f66523c421529d6847c0882d8ab467392ee8da1e3a4fca0d6d4e6ebda5b737
-
Filesize
244KB
MD5eeba3dd643ced2781ec1b7e3cd6fa246
SHA12d394173e603625e231633fc270072e854bac17b
SHA256bee0799a52fe65b8dc291de32f0c8b03b5a067915b1868bc8ba2a1b139c90b87
SHA512222d4fbc7ee57d75889698a0660996293a0143518fdecc1b222618796d76d40f2d3b00b071f92ab917ac8847f195d7de02df55b5e89dad8a80d110e464cd3271
-
Filesize
904KB
MD5eda506335138baf7e7cf4c8c8a720039
SHA1ceb81abd747e7f94a0056ce2cd7658b415e90a11
SHA2560fdb40245101b5bd291e12dc2e45243e6e9ddfa70ce5ef893c590d565db2f982
SHA512832dc91811e7df498a4da877808bb9b43ec793f939f96d7cddca0d8342ace1f0347f9593ff3524ab1f8d6ac9a4ef2d78297a0569401dab1a93dce5a96e8f3a3e
-
Filesize
908KB
MD5d5d908487435d39d56e251a06d687f3f
SHA15537b69a8f9004ab3f3fd0240947bda6646605b2
SHA256c83d7f4e177392df98d3c3f6a9a39416c61d928a4537b0b544629e3aafa4fbb2
SHA512e502acb24e79f752a5a2c0cb8bcf58c742259898de75a729137bee1f692e279c518a93c73509ebbb1e0401c6e9d43347054318cff40532a3ba64cf29ba5f6bf2
-
Filesize
223KB
MD5f7991343cf02ed92cb59f394e8b89f1f
SHA1573ad9af63a6a0ab9b209ece518fd582b54cfef5
SHA2561c09759dcd31fdc81bcd6685438d7efb34e0229f1096bfd57d41ecfe614d07dc
SHA512fa3cf314100f5340c7d0f6a70632a308fcadb4b48785753310a053a510169979a89637b8b4fedf4d3690db6b8b55146e323cad70d704c4e2ede4edff5284237d
-
Filesize
1KB
MD5677be8be80a688bdd5cae693be94f3be
SHA1172c4f1affce3ffc68079cfd20dd3c5219ffe762
SHA256be7f9c71548a17c65afaf1ce92a889d441d179ac3734ce6c8d993d2db078f168
SHA512cbaf5b86a121031941b69609c00dc7c3b01a5c8edc4d7118ee1fc5c88fb73ab8501efbdca42301131161af6b38333f5146dd4e8171c0170fdc9d8f465260dfb3