Analysis
-
max time kernel
150s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
525e592cad025c414c14cee1bcbaeb3a3be1cd42390fc21ce7ef34e028824a40.dll
Resource
win7-20240729-en
General
-
Target
525e592cad025c414c14cee1bcbaeb3a3be1cd42390fc21ce7ef34e028824a40.dll
-
Size
1.3MB
-
MD5
f84b2da4a842d7b705d104df3ff1dfac
-
SHA1
bab36606ed69758eb3dc898583529bb0f6d3b46f
-
SHA256
525e592cad025c414c14cee1bcbaeb3a3be1cd42390fc21ce7ef34e028824a40
-
SHA512
c91d9c63d5e95a1f2413a7236fc1c70a6d406c9b498740eb0d0fd25d1a568a17bef6bffd1ef724e2a553ebfc6f330fbbeda92ae837191e2d6967154ba957a7e7
-
SSDEEP
12288:xXBQ3fMQyWV0rbDxyBWZh2TvtgHoiemIKI1ydX7wmqzq3wkgJ:NB/Qn0rbD8UZUDtgIiemI51Mwtewkm
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1212-4-0x00000000024F0000-0x00000000024F1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2548-1-0x000007FEF7270000-0x000007FEF73BB000-memory.dmp dridex_payload behavioral1/memory/1212-29-0x0000000140000000-0x000000014014B000-memory.dmp dridex_payload behavioral1/memory/1212-21-0x0000000140000000-0x000000014014B000-memory.dmp dridex_payload behavioral1/memory/1212-40-0x0000000140000000-0x000000014014B000-memory.dmp dridex_payload behavioral1/memory/1212-42-0x0000000140000000-0x000000014014B000-memory.dmp dridex_payload behavioral1/memory/2548-49-0x000007FEF7270000-0x000007FEF73BB000-memory.dmp dridex_payload behavioral1/memory/2600-59-0x000007FEF7390000-0x000007FEF750F000-memory.dmp dridex_payload behavioral1/memory/2600-63-0x000007FEF7390000-0x000007FEF750F000-memory.dmp dridex_payload behavioral1/memory/2272-76-0x000007FEF7290000-0x000007FEF73DD000-memory.dmp dridex_payload behavioral1/memory/2272-80-0x000007FEF7290000-0x000007FEF73DD000-memory.dmp dridex_payload behavioral1/memory/3040-92-0x000007FEF6500000-0x000007FEF664C000-memory.dmp dridex_payload behavioral1/memory/3040-96-0x000007FEF6500000-0x000007FEF664C000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2600 StikyNot.exe 2272 rrinstaller.exe 3040 rekeywiz.exe -
Loads dropped DLL 7 IoCs
pid Process 1212 Process not Found 2600 StikyNot.exe 1212 Process not Found 2272 rrinstaller.exe 1212 Process not Found 3040 rekeywiz.exe 1212 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Proof\\jmVa\\rrinstaller.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA StikyNot.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2660 1212 Process not Found 29 PID 1212 wrote to memory of 2660 1212 Process not Found 29 PID 1212 wrote to memory of 2660 1212 Process not Found 29 PID 1212 wrote to memory of 2600 1212 Process not Found 30 PID 1212 wrote to memory of 2600 1212 Process not Found 30 PID 1212 wrote to memory of 2600 1212 Process not Found 30 PID 1212 wrote to memory of 2576 1212 Process not Found 31 PID 1212 wrote to memory of 2576 1212 Process not Found 31 PID 1212 wrote to memory of 2576 1212 Process not Found 31 PID 1212 wrote to memory of 2272 1212 Process not Found 32 PID 1212 wrote to memory of 2272 1212 Process not Found 32 PID 1212 wrote to memory of 2272 1212 Process not Found 32 PID 1212 wrote to memory of 1504 1212 Process not Found 33 PID 1212 wrote to memory of 1504 1212 Process not Found 33 PID 1212 wrote to memory of 1504 1212 Process not Found 33 PID 1212 wrote to memory of 3040 1212 Process not Found 34 PID 1212 wrote to memory of 3040 1212 Process not Found 34 PID 1212 wrote to memory of 3040 1212 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\525e592cad025c414c14cee1bcbaeb3a3be1cd42390fc21ce7ef34e028824a40.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
C:\Windows\system32\StikyNot.exeC:\Windows\system32\StikyNot.exe1⤵PID:2660
-
C:\Users\Admin\AppData\Local\Dw7n\StikyNot.exeC:\Users\Admin\AppData\Local\Dw7n\StikyNot.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2600
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Local\eaxz\rrinstaller.exeC:\Users\Admin\AppData\Local\eaxz\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2272
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵PID:1504
-
C:\Users\Admin\AppData\Local\1bBvThvo\rekeywiz.exeC:\Users\Admin\AppData\Local\1bBvThvo\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54bf3ac9de7e8c851e362855952c6e96c
SHA155eacb07220a7069bb2c3caf7f2f828f56398e52
SHA2564e3544489ba6a7387a13569d7b6af8627514a1c71faf2c0ea9db2845370ae444
SHA512799092247081d00c98f6f6f1f7f9668f45ebecfbaa1e11cc6815414cfde88a33f115247f435907701a300188d5e2aa5ac580f93f91a02352d88b83628b139146
-
Filesize
1.5MB
MD580c88f6c5234431074b3f64610cf9244
SHA15190c7600c4c1976322c8a0c1fb488b929251143
SHA256a279794790b994916fb9085612ce04a4af76a0b246f96929cf3d17c3f342acf6
SHA51235a4e7719938d7befe78def3cb39a8a0f6a390431812f972ea7b09cf88b2c01bf114cba6e1b2cdf4b9356bd5b964fe45c4dc702268d04e156048b4265e7b5219
-
Filesize
1.3MB
MD53032770230992890cc0ce4a8379f8d41
SHA17f93ab22c437a669a2d4c478bc28fcb24dbc0606
SHA256ac3bf52af699f8db655fe373306ca0ef0d65d9f08c7e4fb72fca2827c809b0ad
SHA512e923120b88e1ae052195409fc95803178b6e978c83e609e5c3cfe8d392abd7838e63dcc67b83ea8259a8f82383960e3c402e976629b305b85bd73c1c7ef1feea
-
Filesize
1KB
MD5046ec0fb2955d3891fc31cd8b87565b6
SHA104d9f4c64b3c14fb8aa745bd6fa70806adb94d56
SHA256b52c2ec85cfb71c4790f628fc7eded250fa960562b442efa5ef39abc54a7ad90
SHA5128b0ac2dda49276c7ae34b026da25f2bd292e62f59d4375b54a7ace677a32f6319434acf2985ac12ffee26a1d4245dcf3443a21f7c49b33e8aa2bd523c9f51752
-
Filesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
Filesize
417KB
MD5b22cb67919ebad88b0e8bb9cda446010
SHA1423a794d26d96d9f812d76d75fa89bffdc07d468
SHA2562f744feac48ede7d6b6d2727f7ddfa80b26d9e3b0009741b00992b19ad85e128
SHA512f40aad2a381b766aae0a353fae3ab759d5c536b2d00d135527bba37b601d2f24323f079bd09600355d79404d574ac59201d415ef64c1568877ad0ce0da2dd1d5
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4