Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
0fe4a1f561c62db783b0319724978bd87d6cd1cb2160c21cee7d6332e6376cb4.dll
Resource
win7-20240903-en
General
-
Target
0fe4a1f561c62db783b0319724978bd87d6cd1cb2160c21cee7d6332e6376cb4.dll
-
Size
936KB
-
MD5
e3131866f91556ad080fe2a779aa1b17
-
SHA1
df96ad3471403e2b98e66b15851280ea51e13291
-
SHA256
0fe4a1f561c62db783b0319724978bd87d6cd1cb2160c21cee7d6332e6376cb4
-
SHA512
288e9f5ce7ea185db87f0034cc39409c7d9fbbe334e6b71da5569d02d207103a343513985e15286771b841faaccb4bb5f4224bd0419d24d7967f65d71eb93d89
-
SSDEEP
12288:DPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:DtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3516-3-0x0000000002060000-0x0000000002061000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/1404-2-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/3516-23-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/3516-35-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/1404-37-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/3056-46-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/3056-49-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/1476-60-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/1476-64-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/2552-79-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 3056 ProximityUxHost.exe 1476 WMPDMC.exe 2552 dwm.exe -
Loads dropped DLL 4 IoCs
pid Process 3056 ProximityUxHost.exe 1476 WMPDMC.exe 2552 dwm.exe 2552 dwm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tsrvevdpr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\KmJWtJXD8\\WMPDMC.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ProximityUxHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WMPDMC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1404 rundll32.exe 1404 rundll32.exe 1404 rundll32.exe 1404 rundll32.exe 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3516 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4896 3516 Process not Found 86 PID 3516 wrote to memory of 4896 3516 Process not Found 86 PID 3516 wrote to memory of 3056 3516 Process not Found 87 PID 3516 wrote to memory of 3056 3516 Process not Found 87 PID 3516 wrote to memory of 4960 3516 Process not Found 88 PID 3516 wrote to memory of 4960 3516 Process not Found 88 PID 3516 wrote to memory of 1476 3516 Process not Found 89 PID 3516 wrote to memory of 1476 3516 Process not Found 89 PID 3516 wrote to memory of 2324 3516 Process not Found 90 PID 3516 wrote to memory of 2324 3516 Process not Found 90 PID 3516 wrote to memory of 2552 3516 Process not Found 91 PID 3516 wrote to memory of 2552 3516 Process not Found 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fe4a1f561c62db783b0319724978bd87d6cd1cb2160c21cee7d6332e6376cb4.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
C:\Windows\system32\ProximityUxHost.exeC:\Windows\system32\ProximityUxHost.exe1⤵PID:4896
-
C:\Users\Admin\AppData\Local\PgMaD\ProximityUxHost.exeC:\Users\Admin\AppData\Local\PgMaD\ProximityUxHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3056
-
C:\Windows\system32\WMPDMC.exeC:\Windows\system32\WMPDMC.exe1⤵PID:4960
-
C:\Users\Admin\AppData\Local\9jTzTT\WMPDMC.exeC:\Users\Admin\AppData\Local\9jTzTT\WMPDMC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1476
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:2324
-
C:\Users\Admin\AppData\Local\C4R\dwm.exeC:\Users\Admin\AppData\Local\C4R\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD52a4c670fa86e15946edf1a58638c6ec7
SHA1ef199cf73935a7da13d43962d9158b25df044fcf
SHA256be033c9e9af9e56cccce8d327637ff290e7d914ae1b64f8e0a2e29fc70681628
SHA512203914b92096a7bd7ef50d20427c89ed19ae3c96367bdad6fe3c4953ea9f3a13fc069003b7465802c8b042d25692327701d74c3dc2d25124b40c0f6bdbe1f2b8
-
Filesize
1.5MB
MD559ce6e554da0a622febce19eb61c4d34
SHA1176a4a410cb97b3d4361d2aea0edbf17e15d04c7
SHA256c36eba7186f7367fe717595f3372a49503c9613893c2ab2eff38b625a50d04ba
SHA512e9b0d310416b66e0055381391bb6b0c19ee26bbcf0e3bb9ea7d696d5851e6efbdd9bdeb250c74638b7d73b20528ea1dfb718e75ad5977aaad77aae36cc7b7e18
-
Filesize
92KB
MD55c27608411832c5b39ba04e33d53536c
SHA1f92f8b7439ce1de4c297046ed1d3ff9f20bc97af
SHA2560ac827c9e35cdaa492ddd435079415805dcc276352112b040bcd34ef122cf565
SHA5121fa25eabc08dff9ea25dfa7da310a677927c6344b76815696b0483f8860fa1469820ff15d88a78ed32f712d03003631d9aceaf9c9851de5dd40c1fc2a7bc1309
-
Filesize
940KB
MD5ea988c8f1b2fe8ae1537a7b8efb74208
SHA1716f79e6adf724ec747b8868f107fe2e125ede05
SHA256c503688c8606c0c3665c5229870d54a47b26fe8db04164e8658f1669d5153fbf
SHA5129612dd202cff8d8eca1b24e7e7339c87825eeecc557969ec6735b1fd42f439b7db4ff4ea684cc7d77efde031b44659b8b4890e04b281eab957907d7d2a67165d
-
Filesize
1.2MB
MD55e0a79e509e5726bd7acd7b2b2f3d300
SHA180b2b3158d1392bf5f9ae20e87abda9655b02a81
SHA256ec586e6e803795dc995fcf96b364160e875ceac950f31a6259be26cd50c7ea8c
SHA5129d372ed4c3efd6d7b06365fb3dd04e8da0bc737d42763bf9d4c7dc540877290eb93b7b3490934e29b5ed9441ac1929eaffbea58bed1827dfcf52c6db0ab4eb5e
-
Filesize
263KB
MD59ea326415b83d77295c70a35feb75577
SHA1f8fc6a4f7f97b242f35066f61d305e278155b8a8
SHA256192bfde77bf280e48f92d1eceacdc7ec4bf31cda46f7d577c7d7c3ec3ac89d8f
SHA5122b1943600f97abcd18778101e33eac00c2bd360a3eff62fef65f668a084d8fa38c3bbdedfc6c2b7e8410aa7c9c3df2734705dc502b4754259121adc9198c3692
-
Filesize
1KB
MD5ce499053d2f63bb389ffda705ab7b92f
SHA13370971d5fe211c2b08db02fc3413cad4ca12810
SHA256c2e471cda4bd5b7658829518c71ce9e170b5970146ed1904d45001e54475fda7
SHA5122992e6dd7e680797f40eee7b6daf3dacc9aa5cc960be354b1606616767527a79eebe2a3b2bd45a662fb565debfff0b82de266c6ee332d0c5b4e04ed28e1794cc