Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
b9ecfcc555b3841fc24b5cb6c4a867e272ccfd9ab3e847dcea0a33f7da5de2cfN.dll
Resource
win7-20240903-en
General
-
Target
b9ecfcc555b3841fc24b5cb6c4a867e272ccfd9ab3e847dcea0a33f7da5de2cfN.dll
-
Size
1.1MB
-
MD5
a963e5563d9df9750d85194fad36f820
-
SHA1
c9915fb3d1a2e116afdd1f72f4c33c24943c5978
-
SHA256
b9ecfcc555b3841fc24b5cb6c4a867e272ccfd9ab3e847dcea0a33f7da5de2cf
-
SHA512
b70b0d7dd65c59acf9609991bc3853926d06c557102a1a803007de42ce2efbc9291f587f1eac7ca91ab23b1f84be44f4403760397071406608bd349a17ee8eeb
-
SSDEEP
12288:IGVNJAvuPFUl/faxmVlBLXKCgFfEK7JRLeHlX//ve77:Z3JAvRl/fKQKCgFfx4P/va7
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1208-5-0x0000000002F90000-0x0000000002F91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1628 wbengine.exe 2200 msdt.exe 1900 rdpshell.exe -
Loads dropped DLL 7 IoCs
pid Process 1208 Process not Found 1628 wbengine.exe 1208 Process not Found 2200 msdt.exe 1208 Process not Found 1900 rdpshell.exe 1208 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wtobeyey = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\Low\\cJZO\\msdt.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 2668 rundll32.exe 1208 Process not Found 1628 wbengine.exe 2200 msdt.exe 1900 rdpshell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2572 1208 Process not Found 30 PID 1208 wrote to memory of 2572 1208 Process not Found 30 PID 1208 wrote to memory of 2572 1208 Process not Found 30 PID 1208 wrote to memory of 1628 1208 Process not Found 31 PID 1208 wrote to memory of 1628 1208 Process not Found 31 PID 1208 wrote to memory of 1628 1208 Process not Found 31 PID 1208 wrote to memory of 2252 1208 Process not Found 32 PID 1208 wrote to memory of 2252 1208 Process not Found 32 PID 1208 wrote to memory of 2252 1208 Process not Found 32 PID 1208 wrote to memory of 2200 1208 Process not Found 33 PID 1208 wrote to memory of 2200 1208 Process not Found 33 PID 1208 wrote to memory of 2200 1208 Process not Found 33 PID 1208 wrote to memory of 2288 1208 Process not Found 34 PID 1208 wrote to memory of 2288 1208 Process not Found 34 PID 1208 wrote to memory of 2288 1208 Process not Found 34 PID 1208 wrote to memory of 1900 1208 Process not Found 35 PID 1208 wrote to memory of 1900 1208 Process not Found 35 PID 1208 wrote to memory of 1900 1208 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9ecfcc555b3841fc24b5cb6c4a867e272ccfd9ab3e847dcea0a33f7da5de2cfN.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2668
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵PID:2572
-
C:\Users\Admin\AppData\Local\slkxY\wbengine.exeC:\Users\Admin\AppData\Local\slkxY\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:1628
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:2252
-
C:\Users\Admin\AppData\Local\cKR4rvUwK\msdt.exeC:\Users\Admin\AppData\Local\cKR4rvUwK\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:2200
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:2288
-
C:\Users\Admin\AppData\Local\ENt\rdpshell.exeC:\Users\Admin\AppData\Local\ENt\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52246a6f01e0af8e6a52fb98505fb6c77
SHA1aa474b2c1337b45d9716fa55aa5de99d15b16049
SHA2567c2e22c943e7d62a439c6987be7bf05fc1e6f20af9729ce794f79799da982fe2
SHA5125f0418c8b42945d205f757f4dee9cd39a8003fa2dc74b4455aa7d7bbd50652c6ebbf07f4a9392e37eb98a2b799a344ce98b6588575a7b3d4899c864e0807e90e
-
Filesize
1KB
MD54fc3dfbf200a8bc12993b869f15b7593
SHA1f3ac4f16d2766981064f10dd900168e880487d6c
SHA2563417c14b3162e3c3a490edc790f0f21f8bd6d66ed4567e237b9ec09105a99d80
SHA512c9d203ea8c23efc9a5d22921b76d73a8e3499c879aff5e902e43388453d6f32179ee4c53a1e17a4b49222e340570166fdd00aad9e5b3bf7e47503a1458e2039c
-
Filesize
292KB
MD5a62dfcea3a58ba8fcf32f831f018fe3f
SHA175f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b
SHA256f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e
SHA5129a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603
-
Filesize
1.1MB
MD53178b351336b9ae434455be19e87ecd8
SHA1dab6f9d13dff086f54beea46450fbb40f4ddf321
SHA25612cda58fb21fccd00053659873ec9c12343d47b3e206621c8f63f54023995779
SHA512492592c21033f4ec185efc05e926e68a906ac864cc4a7230d1dfd64a60d5f11f3fd71b1e91c05b8c4c69e9334a9bbd27dfd0a9fcdd4ca0a41861b1bcf6138206
-
Filesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
Filesize
1.1MB
MD53a654d5c3f7ba17f740a121b3443d150
SHA152ec4e2ed7100f5493a1d0638d4034ca72a968f9
SHA25640b67f634280f07bb995a9dacb483bf1dc35af7ef7407bdf317cc6774e42e076
SHA51297f756c328669f337133367655eb4bb7f402a52c437082a19871a72d3dc655864e4af9656a4f00d43262473ca4c43c5f345a28438785d14240895b8fcc1cedc8
-
Filesize
1.4MB
MD578f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2