Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll
Resource
win7-20240903-en
General
-
Target
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll
-
Size
936KB
-
MD5
e6080347ef82059989855367f707b6f5
-
SHA1
af2f5c40bdd1b55fde1fab97d91e5e7e12733731
-
SHA256
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544
-
SHA512
6a58fb67a3cc61fdccbe8335309964d1c2d2cc9db2d1e47797fa0ba2de69631f71ba4499e9b65d921846832f33e358356ac917f836616d6a0d08209767f1c82b
-
SSDEEP
12288:DPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:DtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1232-4-0x0000000002530000-0x0000000002531000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2676-0-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1232-23-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1232-34-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1232-36-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/2676-43-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/3060-53-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/3060-57-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2552-74-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2056-90-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 3060 msra.exe 2552 slui.exe 2056 wusa.exe -
Loads dropped DLL 7 IoCs
pid Process 1232 Process not Found 3060 msra.exe 1232 Process not Found 2552 slui.exe 1232 Process not Found 2056 wusa.exe 1232 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zoekctxdbskyzr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\CAT0KZ8\\slui.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2676 rundll32.exe 2676 rundll32.exe 2676 rundll32.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2656 1232 Process not Found 30 PID 1232 wrote to memory of 2656 1232 Process not Found 30 PID 1232 wrote to memory of 2656 1232 Process not Found 30 PID 1232 wrote to memory of 3060 1232 Process not Found 31 PID 1232 wrote to memory of 3060 1232 Process not Found 31 PID 1232 wrote to memory of 3060 1232 Process not Found 31 PID 1232 wrote to memory of 1680 1232 Process not Found 32 PID 1232 wrote to memory of 1680 1232 Process not Found 32 PID 1232 wrote to memory of 1680 1232 Process not Found 32 PID 1232 wrote to memory of 2552 1232 Process not Found 33 PID 1232 wrote to memory of 2552 1232 Process not Found 33 PID 1232 wrote to memory of 2552 1232 Process not Found 33 PID 1232 wrote to memory of 2456 1232 Process not Found 34 PID 1232 wrote to memory of 2456 1232 Process not Found 34 PID 1232 wrote to memory of 2456 1232 Process not Found 34 PID 1232 wrote to memory of 2056 1232 Process not Found 35 PID 1232 wrote to memory of 2056 1232 Process not Found 35 PID 1232 wrote to memory of 2056 1232 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:2656
-
C:\Users\Admin\AppData\Local\WGIhwoyb2\msra.exeC:\Users\Admin\AppData\Local\WGIhwoyb2\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3060
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:1680
-
C:\Users\Admin\AppData\Local\kzb5Os6\slui.exeC:\Users\Admin\AppData\Local\kzb5Os6\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2552
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:2456
-
C:\Users\Admin\AppData\Local\d2JNTG\wusa.exeC:\Users\Admin\AppData\Local\d2JNTG\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD50c3bf4d204e5ded8bde773e5ae976111
SHA1b637ea84be36e41328092ffb9e6f21fc5efe49df
SHA25618cd58e03eabaad3058408a9f4a2abaa1b008cab08bfdff66ea99676039bcb0f
SHA5124c69b086de1394a855414fa20f02d5af305786e2d56713f3a87a0ef87e92abd53f0ef1508c111bfae840def11c1e33519152782e9ec9b00bf61c4e64b2ef6c7d
-
Filesize
940KB
MD5a51872f2b9094d4c3b9c96e699428a9a
SHA15d22899f5ab5bdeb91680ade099d60e2fc37fad7
SHA256cdd1acf5361bd48c13e273b827269ce0fd8f3db66ecbc92cc7cc67794f9fff69
SHA5129a91821c8d1328a53bb668fa71ce38124f9a6d7823ae7d0e47ced296e7ff18c60ebeadf7a897923ca4a9f0bb31cd8b7b2b6d296481a33806484ab8269d615e53
-
Filesize
940KB
MD52568fb9bef4179e3b12f98ef54cc46b0
SHA19208b8eabdedf81c57741eb02a3a0bfc03d08b2f
SHA25698fdc8ef98ce19493f1ad851b566836cd303c38f17faa318b3040d918594c4c0
SHA512de992f3618ac5b4b1f4bc725fac2f1dbfbfb90d874a79a169b982935528ecdbb3a31f2b6b40952adf1ed3fcceca7d90217125fe9433c28d9bc556ea236ed96db
-
Filesize
1KB
MD57a7eb45362331b2c0d55eb9fc7173e33
SHA15bdc844e3c414cf234c9399765f4d8eedf0f4f21
SHA2560a448b1e9bc922e2bcd4dc6405e2b7c50aa7a41d28fcbc811d72499826457b07
SHA5126b8939597e8d4eca47aa5b66a5e74efd99ee4197f81f14a7ad9c74c5c1aece1f849a2f6d48f07602682612d809838b8908af691cb3f3b338b4d575a13a977b3b
-
Filesize
636KB
MD5e79df53bad587e24b3cf965a5746c7b6
SHA187a97ec159a3fc1db211f3c2c62e4d60810e7a70
SHA2564e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d
SHA5129a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb
-
Filesize
300KB
MD5c15b3d813f4382ade98f1892350f21c7
SHA1a45c5abc6751bc8b9041e5e07923fa4fc1b4542b
SHA2568f067da98eb3ea9f1db2f0063ff54e07d992fbf051779b467e222639be4127e3
SHA5126d028fe81fe45d0ef291741513ecf939e412912647347d4d5bad89571f33e1084dc0fd26eb7313c7191f938c3f50243f453e2690e2475fc3f5539a20c2ff2f3c
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c