Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
b7145f389fc79052d20e54ce49b5b51194dccd385e08850eb11dc068d6ba6e4c.dll
Resource
win7-20240903-en
General
-
Target
b7145f389fc79052d20e54ce49b5b51194dccd385e08850eb11dc068d6ba6e4c.dll
-
Size
940KB
-
MD5
6767a3a501338fa1e0d20387797baa25
-
SHA1
3b3b1b8514899ce981e091b1f10c5981e2276e39
-
SHA256
b7145f389fc79052d20e54ce49b5b51194dccd385e08850eb11dc068d6ba6e4c
-
SHA512
8571d5e0b210cac49012909d6e326b5bfd47718f115d63c23f540ff79a9d32f7bb1ada10d5b65248d99a7789eadbd4db823fe40dfffbbdc4af6c67affe431118
-
SSDEEP
12288:YPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:YtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-4-0x0000000002AE0000-0x0000000002AE1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2728-0-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1192-24-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1192-37-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1192-36-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2728-44-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1376-54-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1376-58-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1972-75-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1304-91-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
cmstp.exeDisplaySwitch.exedvdupgrd.exepid process 1376 cmstp.exe 1972 DisplaySwitch.exe 1304 dvdupgrd.exe -
Loads dropped DLL 7 IoCs
Processes:
cmstp.exeDisplaySwitch.exedvdupgrd.exepid process 1192 1376 cmstp.exe 1192 1972 DisplaySwitch.exe 1192 1304 dvdupgrd.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\ydLXYdh\\DisplaySwitch.exe" -
Processes:
rundll32.execmstp.exeDisplaySwitch.exedvdupgrd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.execmstp.exepid process 2728 rundll32.exe 2728 rundll32.exe 2728 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1376 cmstp.exe 1376 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 1152 1192 cmstp.exe PID 1192 wrote to memory of 1152 1192 cmstp.exe PID 1192 wrote to memory of 1152 1192 cmstp.exe PID 1192 wrote to memory of 1376 1192 cmstp.exe PID 1192 wrote to memory of 1376 1192 cmstp.exe PID 1192 wrote to memory of 1376 1192 cmstp.exe PID 1192 wrote to memory of 1964 1192 DisplaySwitch.exe PID 1192 wrote to memory of 1964 1192 DisplaySwitch.exe PID 1192 wrote to memory of 1964 1192 DisplaySwitch.exe PID 1192 wrote to memory of 1972 1192 DisplaySwitch.exe PID 1192 wrote to memory of 1972 1192 DisplaySwitch.exe PID 1192 wrote to memory of 1972 1192 DisplaySwitch.exe PID 1192 wrote to memory of 2100 1192 dvdupgrd.exe PID 1192 wrote to memory of 2100 1192 dvdupgrd.exe PID 1192 wrote to memory of 2100 1192 dvdupgrd.exe PID 1192 wrote to memory of 1304 1192 dvdupgrd.exe PID 1192 wrote to memory of 1304 1192 dvdupgrd.exe PID 1192 wrote to memory of 1304 1192 dvdupgrd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7145f389fc79052d20e54ce49b5b51194dccd385e08850eb11dc068d6ba6e4c.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵PID:1152
-
C:\Users\Admin\AppData\Local\TLJBeMXs\cmstp.exeC:\Users\Admin\AppData\Local\TLJBeMXs\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵PID:1964
-
C:\Users\Admin\AppData\Local\S7zHf6\DisplaySwitch.exeC:\Users\Admin\AppData\Local\S7zHf6\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1972
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵PID:2100
-
C:\Users\Admin\AppData\Local\66ir1KNSw\dvdupgrd.exeC:\Users\Admin\AppData\Local\66ir1KNSw\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD5059d4713fbd28e2405e744d533b8a22a
SHA10e978fd33ade0e3c0a4e5db429b829b53768a3d8
SHA256c2102a1ed19441cc60ce3503de21c998c58191dfa8e48efe0cf87a9541f2b43c
SHA512ace990522884806489814598799e231fee76aa089ba5205b3a210e549ecae0feb504995a62006380bc61be2d0d8cdb49ccafa364f2840fbfc434843ade3a98e5
-
Filesize
944KB
MD56790b10e99d9d2e6a522464998d5cbc6
SHA1e343d665024cee0d2c1a4510cc4a274d6f06b827
SHA2562346fc4844435925cd653bead0d01704321843868528a4b458663270a0d55727
SHA512bcc9a35c232f2acd8948a7bc05c487ff5b40ceab558755d86331574a7f7b36d3aa3de6c5a4fe79aa50275e9a265af1a0b6628e94cde0cf3e2226cadbb3f1b990
-
Filesize
944KB
MD53e3b91602bee6813223f4e2111fe97f2
SHA17335ab28cc778e59b43d31f33e6826d0264b875b
SHA2567f5120a5a1d5aaa7aa6cf8d6c64371e683b9a72f17aab03409fa9b181b18a620
SHA51269cec60e0deb63dd18950d11a0650c848c4b8493f68b226d67dad1f9ba29f67640ab2ff6b301fbf71a32ca0b1ac7cc4e29feec7332d8b4b1361769682463f70c
-
Filesize
1KB
MD50187065aecf30ecf1b16c48733a30e1a
SHA1eb8491fe0034742d802210bf40024bacf45f93df
SHA25681248f8d9e7f7db6ca17ea176b9a415f1e93b2d2f5f1a9945015c75f3914ce3b
SHA5129b1bd6bda928d7e9179df31f7a623e69a86216be624f23a53f377530f545e47cdfc6e4a3f91ee367fe3976f87caa1aa7be54cb248200ace69114679c237b5ed0
-
Filesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
Filesize
517KB
MD5b795e6138e29a37508285fc31e92bd78
SHA1d0fe0c38c7c61adbb77e58d48b96cd4bf98ecd4a
SHA25601a9733871baa8518092bade3fce62dcca14cdf6fc55b98218253580b38d7659
SHA5128312174a77bab5fef7c4e9efff66c43d3515b02f5766ed1d3b9bd0abb3d7344a9a22cbac228132098428c122293d2b1898b3a2d75f5e4247b1dcb9aa9c7913b1
-
Filesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a