Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
2f16358833b2414eeec6ca8512176982cb9ee1797ea131039e21bc187989e073.dll
Resource
win7-20240903-en
General
-
Target
2f16358833b2414eeec6ca8512176982cb9ee1797ea131039e21bc187989e073.dll
-
Size
936KB
-
MD5
bfcdafe69d90bd7023f8ad9a3010387e
-
SHA1
7fa6a02a6a2ded8ec7146ea384f61c9fa0dd783d
-
SHA256
2f16358833b2414eeec6ca8512176982cb9ee1797ea131039e21bc187989e073
-
SHA512
1a5f3d120c40656d9b8d44f21afbe4841426ff12c0b72e9ef9f493e2c519ae430bd631e3da7cfe90afe8c50e6096215d4dc898044f66922123f210024f46082e
-
SSDEEP
12288:DPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:DtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3432-4-0x0000000002510000-0x0000000002511000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1660-1-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/3432-23-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/3432-34-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/1660-37-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/2500-45-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/2500-49-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/4484-61-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/4484-65-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/3824-80-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
rstrui.exeSysResetErr.exeSndVol.exepid process 2500 rstrui.exe 4484 SysResetErr.exe 3824 SndVol.exe -
Loads dropped DLL 3 IoCs
Processes:
rstrui.exeSysResetErr.exeSndVol.exepid process 2500 rstrui.exe 4484 SysResetErr.exe 3824 SndVol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Husvxt = "C:\\Users\\Admin\\AppData\\Roaming\\Sun\\Java\\Deployment\\EM9mGi\\SysResetErr.exe" -
Processes:
rstrui.exeSysResetErr.exeSndVol.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 3432 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3432 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3432 wrote to memory of 3820 3432 rstrui.exe PID 3432 wrote to memory of 3820 3432 rstrui.exe PID 3432 wrote to memory of 2500 3432 rstrui.exe PID 3432 wrote to memory of 2500 3432 rstrui.exe PID 3432 wrote to memory of 1560 3432 SysResetErr.exe PID 3432 wrote to memory of 1560 3432 SysResetErr.exe PID 3432 wrote to memory of 4484 3432 SysResetErr.exe PID 3432 wrote to memory of 4484 3432 SysResetErr.exe PID 3432 wrote to memory of 2384 3432 SndVol.exe PID 3432 wrote to memory of 2384 3432 SndVol.exe PID 3432 wrote to memory of 3824 3432 SndVol.exe PID 3432 wrote to memory of 3824 3432 SndVol.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f16358833b2414eeec6ca8512176982cb9ee1797ea131039e21bc187989e073.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:3820
-
C:\Users\Admin\AppData\Local\dgiyTA7h9\rstrui.exeC:\Users\Admin\AppData\Local\dgiyTA7h9\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2500
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵PID:1560
-
C:\Users\Admin\AppData\Local\XAJOQZw\SysResetErr.exeC:\Users\Admin\AppData\Local\XAJOQZw\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4484
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:2384
-
C:\Users\Admin\AppData\Local\HA0Ci5\SndVol.exeC:\Users\Admin\AppData\Local\HA0Ci5\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD5c5d939ac3f9d885c8355884199e36433
SHA1b8f277549c23953e8683746e225e7af1c193ad70
SHA25668b6ced01f5dfc2bc9556b005f4fff235a3d02449ad9f9e4de627c0e1424d605
SHA5128488e7928e53085c00df096af2315490cd4b22ce2ce196b157dc0fbb820c5399a9dbd5dead40b24b99a4a32b6de66b4edc28339d7bacd9c1e7d5936604d1a4f0
-
Filesize
940KB
MD5eb566ac5cf3d9d196314f26a8eea6565
SHA1dc1fbc26d02405a2701a3c3c1ef78eddfc90b0c6
SHA2564f92a734fc8bf77c07e50540f2510ba88fe0bd1c8083d40783a609a656d47019
SHA5125844508d7e4a8ca9f216789764fdc43cced4484c1c2c9af7ca059c95e745e7443b9c218868b45214cd5cadba6f560ff294b6f767bd75a84d3ea393cd8c905709
-
Filesize
1.2MB
MD527479c6bee579ee4e718bcd758b08f62
SHA168957ae5482a5029f85299cdbc041b37d08303af
SHA2560a901b1311f2aab5619af350a11656f1a4b8d22bba84527a67a96a9c11bbcc04
SHA5128a012bfa279c1d28368a92e4d8288f4e7e33df99148abf1624b6a19e957392d9147c2ed7f8bffae9da05b05d7ff4b1f984ae63a9ded45b682c68e588ffa0bf26
-
Filesize
41KB
MD5090c6f458d61b7ddbdcfa54e761b8b57
SHA1c5a93e9d6eca4c3842156cc0262933b334113864
SHA256a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd
SHA512c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542
-
Filesize
940KB
MD52768ffb2d7f6d7e61877ae10a8d0a9d1
SHA100da6cde47f65c642a8631617912c6470a6fe9d6
SHA256175e5e0173832d68cb20284367914af04427058e8b3c490ee470e4f6a82c3d19
SHA512bd2d09a36dc18de8bc6d1245d0891974c7786d9490ee27a3e9f747f26a5a3aaadcad3bdc183615dbb25e3e6a383c0c55e95b2f44b67accc4102a1d9b708fa529
-
Filesize
268KB
MD54cad10846e93e85790865d5c0ab6ffd9
SHA18a223f4bab28afa4c7ed630f29325563c5dcda1a
SHA2569ddcfcaf2ebc810cc2e593446681bc4ccbad39756b1712cf045db8dee6310b4b
SHA512c0db44de0d35a70277f8621a318c5099378da675376e47545cfbfa7412e70a870fd05c92e0d6523ea2e0139d54d9eeaed14973762341fa3154406ae36f4ce7c6
-
Filesize
1KB
MD5e8e1722405d0962755035d89740b8d5b
SHA191b3d3cacb687afded533896b1ce4d89d7948fdb
SHA2569271acdda8fd2d6cd641ca89639f0af48577154c1a5c30370c9ead6500b90b9c
SHA512362a070d6b25b023fda27b7e3aeb6fad7a5a9bd903775ca95116337d0c604f06f37951dfab6d6c204ff2f2b6e9a324332fcbedf1b0776e09669d6f2f3c04e425