Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
e24980b28ec5594c3d1a3d103fd47d1b143d0af8c5dd1209c05a92c5253a5900.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e24980b28ec5594c3d1a3d103fd47d1b143d0af8c5dd1209c05a92c5253a5900.dll
Resource
win10v2004-20241007-en
General
-
Target
e24980b28ec5594c3d1a3d103fd47d1b143d0af8c5dd1209c05a92c5253a5900.dll
-
Size
940KB
-
MD5
e0b9356be4ee72141b4e5a8a3f3b6073
-
SHA1
053fd016717cb83924ae47970d162f6e818c5231
-
SHA256
e24980b28ec5594c3d1a3d103fd47d1b143d0af8c5dd1209c05a92c5253a5900
-
SHA512
45d8c614ac2a5872755b3e29f432c7b3eb07596c4acb07d3212e26f0f5e6746d5c32f0cc8b70966cf4a2d28c4bce1afd9c3b7d8a1c0c6d2a52313f9664a02874
-
SSDEEP
12288:wPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:wtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1236-4-0x0000000002DE0000-0x0000000002DE1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2144-0-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1236-24-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1236-36-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1236-35-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2144-44-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2200-53-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2200-57-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2728-73-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1216-89-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
Dxpserver.exemsdt.exeperfmon.exepid Process 2200 Dxpserver.exe 2728 msdt.exe 1216 perfmon.exe -
Loads dropped DLL 7 IoCs
Processes:
Dxpserver.exemsdt.exeperfmon.exepid Process 1236 2200 Dxpserver.exe 1236 2728 msdt.exe 1236 1216 perfmon.exe 1236 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wtobeyey = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\NATIVE~1\\WI\\msdt.exe" -
Processes:
Dxpserver.exemsdt.exeperfmon.exerundll32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1236 wrote to memory of 3036 1236 30 PID 1236 wrote to memory of 3036 1236 30 PID 1236 wrote to memory of 3036 1236 30 PID 1236 wrote to memory of 2200 1236 31 PID 1236 wrote to memory of 2200 1236 31 PID 1236 wrote to memory of 2200 1236 31 PID 1236 wrote to memory of 2956 1236 32 PID 1236 wrote to memory of 2956 1236 32 PID 1236 wrote to memory of 2956 1236 32 PID 1236 wrote to memory of 2728 1236 33 PID 1236 wrote to memory of 2728 1236 33 PID 1236 wrote to memory of 2728 1236 33 PID 1236 wrote to memory of 2440 1236 34 PID 1236 wrote to memory of 2440 1236 34 PID 1236 wrote to memory of 2440 1236 34 PID 1236 wrote to memory of 1216 1236 35 PID 1236 wrote to memory of 1216 1236 35 PID 1236 wrote to memory of 1216 1236 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e24980b28ec5594c3d1a3d103fd47d1b143d0af8c5dd1209c05a92c5253a5900.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:3036
-
C:\Users\Admin\AppData\Local\iaEsZ0\Dxpserver.exeC:\Users\Admin\AppData\Local\iaEsZ0\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2200
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:2956
-
C:\Users\Admin\AppData\Local\48UNB7j\msdt.exeC:\Users\Admin\AppData\Local\48UNB7j\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2728
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:2440
-
C:\Users\Admin\AppData\Local\kUVkgRpo\perfmon.exeC:\Users\Admin\AppData\Local\kUVkgRpo\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD5bbf006632fec022fc7b9a5022d47927b
SHA1d429f8e759704f7d9dffbd1f646b2edbf6adb585
SHA25630898187a3b65aac22d87a12db384fedee4dc71d212b0ec63bf0bd6913bc8ce3
SHA512ed0a54ee4849e3520a0cbd00d95d5ffd0492025a49fe250c5e85443ead6af518b2e8f9ad99439a23f471b28a8fc4893ee751bb4e8b987bd471bc68e81f04b052
-
Filesize
944KB
MD509a0e55d9ab0a0d749c9cc812d975e0d
SHA102ffc9c3e6eb50223c516cb147bd8a7712a6d7e6
SHA256059e058b7a4e7ea01484a3d6a405baa4d6005af9fbace2d37f8e6af7f6f61c20
SHA512861366434580f3957b80b3d8064507c3ceebbd5d7dbdb4bcc4225d65bfab20e06c2cafe54d08bf02c94952193385dea135a85456127de8ba26d5385611de929e
-
Filesize
944KB
MD581809dcba95289e7137905c08af2ff43
SHA148ddd0bee98254a454184dc907eab224a6cdaa29
SHA256075f0bcb40c04e93652248274c8b2b449d8ec91e8716627bbd33e1263fba0140
SHA51242900d0568ae9fdddac6cbb53ed2f157038a7a9106c342f2bf0773901d97f7dcd3efe53340a5cde7a5f8fb4e0e6d79e47781f1fa194d1f80e0b674815811ef33
-
Filesize
892B
MD5026b6d0ea028cdea86e0a5c17f8b0770
SHA149e0b5626dcd713a534e42d29fc90efb49183312
SHA2568d51518fb4443f492d3442cd7946e1c7c5836d86e527f934c439fc6b85048ad0
SHA51263af0b0488ffc8284b5e217e707d470501dc76157f6f5044c77089fe9b449e17ea94b8df343f778896b40a6c83252beb715bb04fe83c107fa3a55abacae0e6b4
-
Filesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
Filesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35