Analysis
-
max time kernel
119s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
Resource
win10v2004-20240802-en
General
-
Target
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
-
Size
1.3MB
-
MD5
3caab0352ba2d33f6e283006aa3349a0
-
SHA1
c88e6d554a0cf2f1f9d05867ff0a7607d683e486
-
SHA256
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0b
-
SHA512
ba8acba77d747dce3128da81e1b68f8352ba15e7b75beeee9e78922c3240acbc9348b1979b0f5ec819200c0d9ccbfbd3100e1a58fe0f1c524c5d5460d762527a
-
SSDEEP
12288:MdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:+MIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3524-4-0x0000000002570000-0x0000000002571000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/4104-2-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/3524-58-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/3524-47-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/4104-61-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/1784-68-0x0000000140000000-0x000000014019E000-memory.dmp dridex_payload behavioral2/memory/1784-70-0x0000000140000000-0x000000014019E000-memory.dmp dridex_payload behavioral2/memory/1784-75-0x0000000140000000-0x000000014019E000-memory.dmp dridex_payload behavioral2/memory/964-88-0x0000000140000000-0x0000000140159000-memory.dmp dridex_payload behavioral2/memory/964-93-0x0000000140000000-0x0000000140159000-memory.dmp dridex_payload behavioral2/memory/1840-105-0x0000000140000000-0x000000014015A000-memory.dmp dridex_payload behavioral2/memory/1840-111-0x0000000140000000-0x000000014015A000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
dpapimig.exesethc.exerdpinit.exepid process 1784 dpapimig.exe 964 sethc.exe 1840 rdpinit.exe -
Loads dropped DLL 3 IoCs
Processes:
dpapimig.exesethc.exerdpinit.exepid process 1784 dpapimig.exe 964 sethc.exe 1840 rdpinit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ftxdckjforivc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\SYSTEM~1\\REGA7F~1\\sethc.exe" -
Processes:
rundll32.exedpapimig.exesethc.exerdpinit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4104 rundll32.exe 4104 rundll32.exe 4104 rundll32.exe 4104 rundll32.exe 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 3524 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3524 wrote to memory of 3976 3524 dpapimig.exe PID 3524 wrote to memory of 3976 3524 dpapimig.exe PID 3524 wrote to memory of 1784 3524 dpapimig.exe PID 3524 wrote to memory of 1784 3524 dpapimig.exe PID 3524 wrote to memory of 436 3524 sethc.exe PID 3524 wrote to memory of 436 3524 sethc.exe PID 3524 wrote to memory of 964 3524 sethc.exe PID 3524 wrote to memory of 964 3524 sethc.exe PID 3524 wrote to memory of 3532 3524 rdpinit.exe PID 3524 wrote to memory of 3532 3524 rdpinit.exe PID 3524 wrote to memory of 1840 3524 rdpinit.exe PID 3524 wrote to memory of 1840 3524 rdpinit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:3976
-
C:\Users\Admin\AppData\Local\yXlVASv\dpapimig.exeC:\Users\Admin\AppData\Local\yXlVASv\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1784
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:436
-
C:\Users\Admin\AppData\Local\SnpnNPQ1W\sethc.exeC:\Users\Admin\AppData\Local\SnpnNPQ1W\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:964
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵PID:3532
-
C:\Users\Admin\AppData\Local\bEW\rdpinit.exeC:\Users\Admin\AppData\Local\bEW\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52ff38d42483b71ed7f50ea04f2314991
SHA19c09065e27d0a8d550f9740f6613a6ec22c56e48
SHA2564314e6cff2bb64978ecc31aac2f2c3707240245de8ea308dfea566f3bb4981d3
SHA512f2d81f9a43af25250a26d7ffc37275f384b7f8ce64873733a36dd2a5267894d5dbd19dfd1f84102f5d9cd5cac1d0081216345ebbf4efd78dd2657e6a666ae6da
-
Filesize
104KB
MD58ba3a9702a3f1799431cad6a290223a6
SHA19c7dc9b6830297c8f759d1f46c8b36664e26c031
SHA256615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8
SHA512680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746
-
Filesize
1.4MB
MD54fea1dbdde4ba492af10522c98960456
SHA1753d4d5a364201c0669794c30b018465811e6d5f
SHA256424a0f0442f123d16aba61adcef209b3a7870d5f911f70eb69e7b79a69d94575
SHA512d0bdd4ef55a7df2930471c8fe660ba74c419534250f3311c36498f30d77ef8a889e144ed7d3fb55ea4b0b27fe9d25eabe5000a55ec0a43e97ab29c57c1e50f8c
-
Filesize
343KB
MD5b0ecd76d99c5f5134aeb52460add6f80
SHA151462078092c9d6b7fa2b9544ffe0a49eb258106
SHA25651251863097f7c80ef59606152ec59e7522881c8e3886c194c43f56bcab92e1b
SHA51216855c7db48b26297c78d37d52ad03f6af0f5a58e333e17ad83b34f5e8b200c5517c6481043af0ecf1b962af2378f38600bd968592f4e1018b5a1b9400adb367
-
Filesize
1.6MB
MD5895e6f3785744191630f687f82f908bc
SHA10f37c1fa2589771aa9006819cea8dcb84715d2fb
SHA25677405ce9f3d867978b9e995e50fe7bce64bac620edb72fdd6a2529efdbe9bd05
SHA512858edcf70f4aa662f9b0e040261811efb96ca7ad653e9a2f6e8b57c09000426c9c0e0576366db51399c7cca011840182a4c739f42f601f8ea938f119a8b9548b
-
Filesize
76KB
MD5b6d6477a0c90a81624c6a8548026b4d0
SHA1e6eac6941d27f76bbd306c2938c0a962dbf1ced1
SHA256a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb
SHA51272ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe
-
Filesize
1KB
MD5bde8c85b320386baba874f41edcd9c64
SHA17eca0c97522788046f295a2091946c026b09d8fd
SHA2561216cc01c3f562c9f82883cee3c380ab50cb08f22b4a09156a2bee42d16a0004
SHA5129aace6e1265a8bf682277e06cc92862e02c504e01ce54185431e1ff94c09d5c4688b66c4b40d19e88161394302129f4ce6edbe83a9330cc7d3f4b1cde0dc6323