Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
Resource
win10v2004-20240910-en
General
-
Target
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll
-
Size
1.3MB
-
MD5
3caab0352ba2d33f6e283006aa3349a0
-
SHA1
c88e6d554a0cf2f1f9d05867ff0a7607d683e486
-
SHA256
e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0b
-
SHA512
ba8acba77d747dce3128da81e1b68f8352ba15e7b75beeee9e78922c3240acbc9348b1979b0f5ec819200c0d9ccbfbd3100e1a58fe0f1c524c5d5460d762527a
-
SSDEEP
12288:MdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:+MIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3444-3-0x0000000007A80000-0x0000000007A81000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1612-1-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/3444-46-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/3444-57-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/1612-60-0x0000000140000000-0x0000000140158000-memory.dmp dridex_payload behavioral2/memory/3312-68-0x0000000140000000-0x000000014019E000-memory.dmp dridex_payload behavioral2/memory/3312-72-0x0000000140000000-0x000000014019E000-memory.dmp dridex_payload behavioral2/memory/2228-89-0x0000000140000000-0x000000014019E000-memory.dmp dridex_payload behavioral2/memory/1576-101-0x0000000140000000-0x0000000140159000-memory.dmp dridex_payload behavioral2/memory/1576-105-0x0000000140000000-0x0000000140159000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
Utilman.exePasswordOnWakeSettingFlyout.exeApplicationFrameHost.exepid process 3312 Utilman.exe 2228 PasswordOnWakeSettingFlyout.exe 1576 ApplicationFrameHost.exe -
Loads dropped DLL 3 IoCs
Processes:
Utilman.exePasswordOnWakeSettingFlyout.exeApplicationFrameHost.exepid process 3312 Utilman.exe 2228 PasswordOnWakeSettingFlyout.exe 1576 ApplicationFrameHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vogna = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\CloudStore\\JgmfuKIR\\PasswordOnWakeSettingFlyout.exe" -
Processes:
rundll32.exeUtilman.exePasswordOnWakeSettingFlyout.exeApplicationFrameHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordOnWakeSettingFlyout.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplicationFrameHost.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 3 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3444 3444 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3444 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3444 wrote to memory of 3864 3444 Utilman.exe PID 3444 wrote to memory of 3864 3444 Utilman.exe PID 3444 wrote to memory of 3312 3444 Utilman.exe PID 3444 wrote to memory of 3312 3444 Utilman.exe PID 3444 wrote to memory of 4884 3444 PasswordOnWakeSettingFlyout.exe PID 3444 wrote to memory of 4884 3444 PasswordOnWakeSettingFlyout.exe PID 3444 wrote to memory of 2228 3444 PasswordOnWakeSettingFlyout.exe PID 3444 wrote to memory of 2228 3444 PasswordOnWakeSettingFlyout.exe PID 3444 wrote to memory of 3688 3444 ApplicationFrameHost.exe PID 3444 wrote to memory of 3688 3444 ApplicationFrameHost.exe PID 3444 wrote to memory of 1576 3444 ApplicationFrameHost.exe PID 3444 wrote to memory of 1576 3444 ApplicationFrameHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e83967e75410b28a9ce51b667e754b0503df3d3e4861f56a1df8914d611a4c0bN.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵PID:3864
-
C:\Users\Admin\AppData\Local\TTo7dJ\Utilman.exeC:\Users\Admin\AppData\Local\TTo7dJ\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3312
-
C:\Windows\system32\PasswordOnWakeSettingFlyout.exeC:\Windows\system32\PasswordOnWakeSettingFlyout.exe1⤵PID:4884
-
C:\Users\Admin\AppData\Local\7H8j\PasswordOnWakeSettingFlyout.exeC:\Users\Admin\AppData\Local\7H8j\PasswordOnWakeSettingFlyout.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2228
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe1⤵PID:3688
-
C:\Users\Admin\AppData\Local\2xntl\ApplicationFrameHost.exeC:\Users\Admin\AppData\Local\2xntl\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5d58a8a987a8dafad9dc32a548cc061e7
SHA1f79fc9e0ab066cad530b949c2153c532a5223156
SHA256cf58e424b86775e6f2354291052126a646f842fff811b730714dfbbd8ebc71a4
SHA51293df28b65af23a5f82124ba644e821614e2e2074c98dbb2bd7319d1dfe9e2179b9d660d7720913c79a8e7b2f8560440789ad5e170b9d94670589885060c14265
-
Filesize
1.3MB
MD5d0ab1cb8c36de5f567ceedbae0afc112
SHA1bd7e13de661bbf6c25d4518586111621643f72f4
SHA256a9cf183edbdd8604c1d0265a53e5f37ea84f79d2ccd06c3d13b1f71afd95c3fe
SHA512923c115b88d1f928abfda749572333e9013e98146b7b54a9e3e666bfdc00bb840b87646061072c854b9043e2dca7f980a22c58ce244d504e545cd755a5faf780
-
Filesize
1.6MB
MD5ea925ca3fca2d23e2df3e514ac54b109
SHA19095cc4b054936d605f0061d2c210262cd240db1
SHA25647aac72ecd1b64fe4e9a2eb6bbf02f15fa91f7cfcf37a71ce789d384d463d661
SHA512555bf774d4b935de1812c1069347aa48e316ef0325429e4a591258f002a63f1230c7829f07609ed80d0254f5242dd8d0c16fd5b7a5c7dddfb7d9b79fe5dd811f
-
Filesize
44KB
MD5591a98c65f624c52882c2b238d6cd4c4
SHA1c960d08c19d777069cf265dcc281807fbd8502d7
SHA2565e6ed524c955fb1ea3e24f132987143da3ec81db5041a0edcfa7bf3ac790eb06
SHA5121999f23c90d85857461f8ddc5342470296f6939a654ac015780c2977f293c1f799fc992462f3d4d9181c97ab960db3291b85ea7c0537edcb57755706b20b6074
-
Filesize
1.6MB
MD5370a9421db3427373dae82b021fe76cc
SHA1ac9fdba921b70501a818e03118de0ea121347002
SHA256ba895e785fe1b3e33e4a29a45a17f5b62b097cbd3b9d8e229e5d8fae047e24c1
SHA512a92181b40a6c9dd666ffde2b81b579546dfe8f71017422ceb749c2e62a2ecb3f67c37b3ff860125cd2c83be250a9abe1cd1eb41a1eb336724299a29ef233e94e
-
Filesize
123KB
MD5a117edc0e74ab4770acf7f7e86e573f7
SHA15ceffb1a5e05e52aafcbc2d44e1e8445440706f3
SHA256b5bc4fce58403ea554691db678e6c8c448310fe59990990f0e37cd4357567d37
SHA51272883f794ff585fe7e86e818d4d8c54fa9781cab6c3fac6f6956f58a016a91f676e70d14691cbe054ae7b7469c6b4783152fbb694e92b940d9e3595fe3f41d97
-
Filesize
1KB
MD540f5b7b611a02a0e39156c8cbebdc477
SHA1d6d2c93f2993e4080c7fbabcb77e266c72aae72d
SHA256d2c5ac32c626decd3cc1417bc7ab295f30d61b83e6d90b5a1b4ddf320266ce20
SHA51203a44e4e618d91fcd0f0fee66527316804b1c4be44b8df07a0ad902d65cb9529bb1ed9520ded65a73ecc6090d002419337838269173a8e56ac6b5597bf6631a6