Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
Resource
win10v2004-20240802-en
General
-
Target
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
-
Size
1.3MB
-
MD5
3caab0352ba2d33f6e283006aa3349a0
-
SHA1
c88e6d554a0cf2f1f9d05867ff0a7607d683e486
-
SHA256
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0b
-
SHA512
ba8acba77d747dce3128da81e1b68f8352ba15e7b75beeee9e78922c3240acbc9348b1979b0f5ec819200c0d9ccbfbd3100e1a58fe0f1c524c5d5460d762527a
-
SSDEEP
12288:MdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:+MIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-4-0x0000000002890000-0x0000000002891000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1236-1-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral1/memory/1204-45-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral1/memory/1204-57-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral1/memory/1204-58-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral1/memory/1236-66-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral1/memory/2600-76-0x0000000140000000-0x000000014015A000-memory.dmp dridex_payload behavioral1/memory/2600-80-0x0000000140000000-0x000000014015A000-memory.dmp dridex_payload behavioral1/memory/2624-93-0x0000000140000000-0x0000000140159000-memory.dmp dridex_payload behavioral1/memory/2624-97-0x0000000140000000-0x0000000140159000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
dpnsvr.exerstrui.exedwm.exepid process 2600 dpnsvr.exe 2624 rstrui.exe 2560 dwm.exe -
Loads dropped DLL 7 IoCs
Processes:
dpnsvr.exerstrui.exedwm.exepid process 1204 2600 dpnsvr.exe 1204 2624 rstrui.exe 1204 2560 dwm.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\FLASHP~1\\sys\\bjcHbkJ5\\rstrui.exe" -
Processes:
rundll32.exedpnsvr.exerstrui.exedwm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpnsvr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2764 1204 dpnsvr.exe PID 1204 wrote to memory of 2764 1204 dpnsvr.exe PID 1204 wrote to memory of 2764 1204 dpnsvr.exe PID 1204 wrote to memory of 2600 1204 dpnsvr.exe PID 1204 wrote to memory of 2600 1204 dpnsvr.exe PID 1204 wrote to memory of 2600 1204 dpnsvr.exe PID 1204 wrote to memory of 2156 1204 rstrui.exe PID 1204 wrote to memory of 2156 1204 rstrui.exe PID 1204 wrote to memory of 2156 1204 rstrui.exe PID 1204 wrote to memory of 2624 1204 rstrui.exe PID 1204 wrote to memory of 2624 1204 rstrui.exe PID 1204 wrote to memory of 2624 1204 rstrui.exe PID 1204 wrote to memory of 840 1204 dwm.exe PID 1204 wrote to memory of 840 1204 dwm.exe PID 1204 wrote to memory of 840 1204 dwm.exe PID 1204 wrote to memory of 2560 1204 dwm.exe PID 1204 wrote to memory of 2560 1204 dwm.exe PID 1204 wrote to memory of 2560 1204 dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
C:\Windows\system32\dpnsvr.exeC:\Windows\system32\dpnsvr.exe1⤵PID:2764
-
C:\Users\Admin\AppData\Local\cgzWUT\dpnsvr.exeC:\Users\Admin\AppData\Local\cgzWUT\dpnsvr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2600
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:2156
-
C:\Users\Admin\AppData\Local\BYz\rstrui.exeC:\Users\Admin\AppData\Local\BYz\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2624
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:840
-
C:\Users\Admin\AppData\Local\3rBVb\dwm.exeC:\Users\Admin\AppData\Local\3rBVb\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD500d05dbb354dc3fb32adead9959b17df
SHA1a9c74e22e20fbf0326723cdf69d538c7f821adef
SHA256888587026816d87ffdd7685b3cc1e6883cdf035243fc14d92bea70353abfe3a5
SHA512909b153bf5f81fbc80408eca97b0eda65d17341b398a340b7faccc88b2c988a37d08ef14ed927709fe425c0c9c66386f5c28b4b914a1498070ef9c6d819114c8
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
Filesize
1.3MB
MD51bcf551dea08057616c75c5fa2db4e65
SHA10b181cd7c2eb648ca635255fb8b124326c15114d
SHA2561293ee96d82bb3a897e6eb5d6dde4206eae3a459e521db824a4551280202d779
SHA512e91984be2b6e7b7b5f25daf7c5c73a88144aa1bbbbc786d576a1dc716ce9861ed4c3ab464b0178c64270663cf193dcac502aa11e4576a6bdda21314ec4ffd3f5
-
Filesize
1.4MB
MD5b0a827a0a08f473ba241441db7c4369e
SHA1d5e5095569e011565b2ca52b5d354b9d69db25e1
SHA2569a150f115e5f2b797423dd177167195a0ca4f3015ff422630ee18f572b0c84d0
SHA512e6125947076bd7ada96c48738afd4a49be04bd61311ab7666f86f8728109eb8180dae0bd934c920a4a040f3d9f402ebd2641fa200901c3633f58ae50a19f808d
-
Filesize
1KB
MD57993732a55eb6b36465e2522c2a5d36a
SHA19ccec6a33670c51ab4ecae40e6b6a6b833ca2ad9
SHA256170cd96e675f3597a8cd2e9dfca3731a2b7972ebf3a1ffe9ef89b64e026750a2
SHA5127c0d9a30cf59a34662f67a5ad2619b33ad79598bd82f9aa84dc075838b7f8540d1578c9181c076475b2c187bec45c0bfc0d9bf5fa48b7b392a1c5d34220377ad
-
Filesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
Filesize
33KB
MD56806b72978f6bd27aef57899be68b93b
SHA1713c246d0b0b8dcc298afaed4f62aed82789951c
SHA2563485ee4159c5f9e4ed9dd06e668d1e04148154ff40327a9ccb591e8c5a79958c
SHA51243c942358b2e949751149ecc4be5ff6cb0634957ff1128ad5e6051e83379fb5643100cae2f6ef3eaf36aff016063c150e93297aa866e780d0e4d51656a251c7b