Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
2f16358833b2414eeec6ca8512176982cb9ee1797ea131039e21bc187989e073.dll
Resource
win7-20240903-en
General
-
Target
2f16358833b2414eeec6ca8512176982cb9ee1797ea131039e21bc187989e073.dll
-
Size
936KB
-
MD5
bfcdafe69d90bd7023f8ad9a3010387e
-
SHA1
7fa6a02a6a2ded8ec7146ea384f61c9fa0dd783d
-
SHA256
2f16358833b2414eeec6ca8512176982cb9ee1797ea131039e21bc187989e073
-
SHA512
1a5f3d120c40656d9b8d44f21afbe4841426ff12c0b72e9ef9f493e2c519ae430bd631e3da7cfe90afe8c50e6096215d4dc898044f66922123f210024f46082e
-
SSDEEP
12288:DPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:DtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-4-0x0000000002CF0000-0x0000000002CF1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2544-0-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1196-23-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1196-35-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1196-34-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/2544-43-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/2860-53-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2860-57-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2696-70-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2696-73-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2944-95-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
lpksetup.exemmc.exerstrui.exepid process 2860 lpksetup.exe 2696 mmc.exe 2944 rstrui.exe -
Loads dropped DLL 7 IoCs
Processes:
lpksetup.exemmc.exerstrui.exepid process 1196 2860 lpksetup.exe 1196 2696 mmc.exe 1196 2944 rstrui.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dnfwvyvycst = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\Recent\\HyzXqtd\\mmc.exe" -
Processes:
lpksetup.exemmc.exerstrui.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2544 rundll32.exe 2544 rundll32.exe 2544 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 2964 1196 lpksetup.exe PID 1196 wrote to memory of 2964 1196 lpksetup.exe PID 1196 wrote to memory of 2964 1196 lpksetup.exe PID 1196 wrote to memory of 2860 1196 lpksetup.exe PID 1196 wrote to memory of 2860 1196 lpksetup.exe PID 1196 wrote to memory of 2860 1196 lpksetup.exe PID 1196 wrote to memory of 2628 1196 mmc.exe PID 1196 wrote to memory of 2628 1196 mmc.exe PID 1196 wrote to memory of 2628 1196 mmc.exe PID 1196 wrote to memory of 2696 1196 mmc.exe PID 1196 wrote to memory of 2696 1196 mmc.exe PID 1196 wrote to memory of 2696 1196 mmc.exe PID 1196 wrote to memory of 2948 1196 rstrui.exe PID 1196 wrote to memory of 2948 1196 rstrui.exe PID 1196 wrote to memory of 2948 1196 rstrui.exe PID 1196 wrote to memory of 2944 1196 rstrui.exe PID 1196 wrote to memory of 2944 1196 rstrui.exe PID 1196 wrote to memory of 2944 1196 rstrui.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f16358833b2414eeec6ca8512176982cb9ee1797ea131039e21bc187989e073.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵PID:2964
-
C:\Users\Admin\AppData\Local\IJveok9vA\lpksetup.exeC:\Users\Admin\AppData\Local\IJveok9vA\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2860
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵PID:2628
-
C:\Users\Admin\AppData\Local\Bnkev\mmc.exeC:\Users\Admin\AppData\Local\Bnkev\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2696
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:2948
-
C:\Users\Admin\AppData\Local\avW1U\rstrui.exeC:\Users\Admin\AppData\Local\avW1U\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD5c0fa3144f8540622bf5cf79f2f113ac5
SHA1c2c91c40a4fdedc8147d9ad44572b07ff8c696c0
SHA256b8b4e0dfde44de51caabbe859d254239c4933f3aaa377dab6ca3247bd5da8c38
SHA512dd03176ed87078e6f025be6484156c38b2a637dc16af6fea1a31918664b79b6cf9e2a0af20498e995cf132f4b56f6237ee9b889bd7b5dc3f6f6e73b11ac166c6
-
Filesize
940KB
MD559bc65a4ee608dd54239a559890a9db0
SHA106884b12cde7336da92185023eae5fa8d947e6fc
SHA25602a34a3b80afd7535faaddeb0216915e970dc20cd8027e56043c574d47a39df6
SHA512ca6e2a8533000641af46a218fb3de732a257e2abb085d0c9e2a06e6673dcf73e5f9faf2bd141a7d2fcaca39061d88e324608563a65184a2549a5abe1e452cb55
-
Filesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
Filesize
940KB
MD58dea4ab46ec51b282492ed5884a70157
SHA135e14f9a396454a9a64ad32648bc87df311ca6ae
SHA25649cdb4f3a4a75e4a3894714b4c406001151530dc545e7041119d22353d4d2cd0
SHA5124935a5d8b1ab45ce663fab61d8b5fe8064c6041fd0d270a103ca8aac56f9e849f22adc43219796a6da73f6bdd8528f6825f8ee07bfcfae7d76c0ef0640301c4a
-
Filesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
Filesize
1KB
MD51072dd5fa7057b438e6d75cad71d05dc
SHA1353160c04cc2672e1912914d49e254cfe010e8d0
SHA25656769fb0b3803d55fe567cc5f171ddf5b1314542c8a2b8903d54b716838cf4a5
SHA51213c717a0f54c4b33c881c356805f1798b8a9aa92173056ca1ac26810fbb121bc73cdf49f3bd856a1baf78d8e897e120149f5a560d220f8185bf9c71b51ddc9f0
-
Filesize
2.0MB
MD59fea051a9585f2a303d55745b4bf63aa
SHA1f5dc12d658402900a2b01af2f018d113619b96b8
SHA256b212e59e4c7fe77f6f189138d9d8b151e50eb83a35d6eadfb1e4bb0b4262c484
SHA512beba79f0b6710929871fbdf378d3c0a41f230ac30cbfa87173f7b77c35e06425f48db42ed3b16d5d9bcb7ef0098dffcd0d2947da8fb7ec1136ea62205f1afc76