Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
a7354e5306bdf5dcadd84c2ecda098a0e18abde5a12a9ccb82b140e37dafc437.dll
Resource
win7-20241010-en
General
-
Target
a7354e5306bdf5dcadd84c2ecda098a0e18abde5a12a9ccb82b140e37dafc437.dll
-
Size
944KB
-
MD5
247c192832ca573cd01aadc171a9ee06
-
SHA1
c85533a89188096043caf1b880242d777b7b80ad
-
SHA256
a7354e5306bdf5dcadd84c2ecda098a0e18abde5a12a9ccb82b140e37dafc437
-
SHA512
7e45df90da0b2cbf23dc3c49e79fa297450b9978159c64e7adceb1fd4891fe60f4bd2d4079ac3378b2710fe2763a0cf5a164dcf8415cb26ecde8ef8333581c15
-
SSDEEP
12288:gPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:gtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1180-4-0x0000000002A00000-0x0000000002A01000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/3032-1-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1180-24-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1180-36-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1180-35-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/3032-44-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2752-53-0x0000000140000000-0x00000001400ED000-memory.dmp dridex_payload behavioral1/memory/2752-58-0x0000000140000000-0x00000001400ED000-memory.dmp dridex_payload behavioral1/memory/396-75-0x0000000140000000-0x00000001400ED000-memory.dmp dridex_payload behavioral1/memory/2952-87-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral1/memory/2952-91-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
SoundRecorder.exeiexpress.exeFXSCOVER.exepid process 2752 SoundRecorder.exe 396 iexpress.exe 2952 FXSCOVER.exe -
Loads dropped DLL 7 IoCs
Processes:
SoundRecorder.exeiexpress.exeFXSCOVER.exepid process 1180 2752 SoundRecorder.exe 1180 396 iexpress.exe 1180 2952 FXSCOVER.exe 1180 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kgvptlq = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\UserData\\sMdC\\iexpress.exe" -
Processes:
SoundRecorder.exeiexpress.exeFXSCOVER.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoundRecorder.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3032 rundll32.exe 3032 rundll32.exe 3032 rundll32.exe 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1180 wrote to memory of 2708 1180 SoundRecorder.exe PID 1180 wrote to memory of 2708 1180 SoundRecorder.exe PID 1180 wrote to memory of 2708 1180 SoundRecorder.exe PID 1180 wrote to memory of 2752 1180 SoundRecorder.exe PID 1180 wrote to memory of 2752 1180 SoundRecorder.exe PID 1180 wrote to memory of 2752 1180 SoundRecorder.exe PID 1180 wrote to memory of 2148 1180 iexpress.exe PID 1180 wrote to memory of 2148 1180 iexpress.exe PID 1180 wrote to memory of 2148 1180 iexpress.exe PID 1180 wrote to memory of 396 1180 iexpress.exe PID 1180 wrote to memory of 396 1180 iexpress.exe PID 1180 wrote to memory of 396 1180 iexpress.exe PID 1180 wrote to memory of 2396 1180 FXSCOVER.exe PID 1180 wrote to memory of 2396 1180 FXSCOVER.exe PID 1180 wrote to memory of 2396 1180 FXSCOVER.exe PID 1180 wrote to memory of 2952 1180 FXSCOVER.exe PID 1180 wrote to memory of 2952 1180 FXSCOVER.exe PID 1180 wrote to memory of 2952 1180 FXSCOVER.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7354e5306bdf5dcadd84c2ecda098a0e18abde5a12a9ccb82b140e37dafc437.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
C:\Windows\system32\SoundRecorder.exeC:\Windows\system32\SoundRecorder.exe1⤵PID:2708
-
C:\Users\Admin\AppData\Local\QMV83M\SoundRecorder.exeC:\Users\Admin\AppData\Local\QMV83M\SoundRecorder.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2752
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵PID:2148
-
C:\Users\Admin\AppData\Local\TvlxY0Kpl\iexpress.exeC:\Users\Admin\AppData\Local\TvlxY0Kpl\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:396
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:2396
-
C:\Users\Admin\AppData\Local\tOLca9\FXSCOVER.exeC:\Users\Admin\AppData\Local\tOLca9\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
948KB
MD53b91d5861f5095d5bc32faf3951441b5
SHA127db5dce0b264ceabb4b18d8c7648d9edc89ac2d
SHA256a486789064a4e5b9b968a4408a5d0b6125bb27adf1c821bc36933ceae4a3e027
SHA5129bb2b507ae603b027532ab6f724cef8bfbc54312162b35441e2090423c300f8f04d7c0e026fe9dd2bffddf6ddb63fb326e978812784b3f9e35febb9a136a8c88
-
Filesize
948KB
MD5e6abd5228b0974d39f1fb1fb165e4150
SHA16dd57d6ae1f88d06893c2f8b4410c846acbea2ae
SHA2568a24894f0139814b065894687563193ef746bac1a503a6204fe822b27b1e9c43
SHA5120db35a46ddd62e0fc44cba7ccddf7e2695a6bd390d37570dd8e84539704cfb6f059b6583af52d7f01e2cfc0ae36e67b794fff030024646d6b705860c0519f7c3
-
Filesize
972KB
MD59c99e8b442f3e0ce6cdd643a19452159
SHA10655030bfef14d45167afd357be6d03804e804a7
SHA256e3d621f42bdaf8dfc8f6f125ebd4ade66de680ade4308523c7986ac3d91f21d4
SHA51227e85118c7703b70e3f0e64bff1499f3d1e5af764e3b5e25d51eb93a99c16a776b7414c203cc8e19966f5a70ad0e90f522011fba72fae5daf1474410164839fc
-
Filesize
940B
MD5ce0064c4607328cd6e6d0194c6d6559e
SHA1e312c93c0708e0f9283320435e433298fef83e74
SHA25613bb4367958b45dfa4e4f6f439b25e96cd6725bdfb45ef0478dbaee431102c08
SHA5125a74cd75425deabc98b75022fa6195828684a03c74418661e467820ab3ef259968a6b0e06bf22b18584676a77d9fb0c7ffc3a0ba7a09d2ac4e5705ab01346423
-
Filesize
139KB
MD547f0f526ad4982806c54b845b3289de1
SHA18420ea488a2e187fe1b7fcfb53040d10d5497236
SHA256e81b11fe30b16fa4e3f08810513c245248adce8566355a8f2a19c63b1143ff5b
SHA5124c9a1aa5ed55087538c91a77d7420932263b69e59dc57b1db738e59624265b734bf29e2b6ed8d0adb2e0dec5763bfbf86876fd7d1139c21e829001c7868d515d
-
Filesize
163KB
MD546fd16f9b1924a2ea8cd5c6716cc654f
SHA199284bc91cf829e9602b4b95811c1d72977700b6
SHA2569f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3
SHA51252c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629
-
Filesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b