Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll
Resource
win7-20240903-en
General
-
Target
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll
-
Size
936KB
-
MD5
e6080347ef82059989855367f707b6f5
-
SHA1
af2f5c40bdd1b55fde1fab97d91e5e7e12733731
-
SHA256
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544
-
SHA512
6a58fb67a3cc61fdccbe8335309964d1c2d2cc9db2d1e47797fa0ba2de69631f71ba4499e9b65d921846832f33e358356ac917f836616d6a0d08209767f1c82b
-
SSDEEP
12288:DPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:DtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-4-0x0000000002E20000-0x0000000002E21000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2308-0-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1196-23-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1196-35-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1196-36-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/2308-43-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/2632-53-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2632-57-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2792-69-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2792-73-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/3000-89-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
rdpshell.exeslui.exeTpmInit.exepid process 2632 rdpshell.exe 2792 slui.exe 3000 TpmInit.exe -
Loads dropped DLL 7 IoCs
Processes:
rdpshell.exeslui.exeTpmInit.exepid process 1196 2632 rdpshell.exe 1196 2792 slui.exe 1196 3000 TpmInit.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\3Ong\\slui.exe" -
Processes:
rdpshell.exeslui.exeTpmInit.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TpmInit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2308 rundll32.exe 2308 rundll32.exe 2308 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 2948 1196 rdpshell.exe PID 1196 wrote to memory of 2948 1196 rdpshell.exe PID 1196 wrote to memory of 2948 1196 rdpshell.exe PID 1196 wrote to memory of 2632 1196 rdpshell.exe PID 1196 wrote to memory of 2632 1196 rdpshell.exe PID 1196 wrote to memory of 2632 1196 rdpshell.exe PID 1196 wrote to memory of 2340 1196 slui.exe PID 1196 wrote to memory of 2340 1196 slui.exe PID 1196 wrote to memory of 2340 1196 slui.exe PID 1196 wrote to memory of 2792 1196 slui.exe PID 1196 wrote to memory of 2792 1196 slui.exe PID 1196 wrote to memory of 2792 1196 slui.exe PID 1196 wrote to memory of 1440 1196 TpmInit.exe PID 1196 wrote to memory of 1440 1196 TpmInit.exe PID 1196 wrote to memory of 1440 1196 TpmInit.exe PID 1196 wrote to memory of 3000 1196 TpmInit.exe PID 1196 wrote to memory of 3000 1196 TpmInit.exe PID 1196 wrote to memory of 3000 1196 TpmInit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:2948
-
C:\Users\Admin\AppData\Local\kHd1m\rdpshell.exeC:\Users\Admin\AppData\Local\kHd1m\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2632
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2340
-
C:\Users\Admin\AppData\Local\benmf7yv\slui.exeC:\Users\Admin\AppData\Local\benmf7yv\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2792
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵PID:1440
-
C:\Users\Admin\AppData\Local\v7P\TpmInit.exeC:\Users\Admin\AppData\Local\v7P\TpmInit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD566f36b25cf699f0ec3c676cc714f822d
SHA144133d1035db4726202148e2a04d9f7e36e054df
SHA25603966c7bff087a007c04e0dbb06b47f17e87bd0487b04768465d399c11478a54
SHA51268c4a67edeeebbeab9459a1239b2cde22645a01f18eb2c3f870fe7d8cf8d554ffbe03800d7b12fc3dde53817fb46375e565e3f7d886f56fa548765067b13b9fc
-
Filesize
944KB
MD5510c41b8b0e6065b7b7d38ef9478393a
SHA1fc78edc740f48f2ed20db2c4c8eb55d09d4dc8af
SHA2569279fede83e1f57f3289f3d77203cf0eff93602494e49281a79b73e0fcdd377e
SHA512920a5a871a3eb9d1ff7e0c1769f9bda1699d5fa7f159344c1eb6a98f10b59b6dd657d6791dceac25030241efb825ec717bd46c3aeb095d519dc257d07122bc41
-
Filesize
940KB
MD51f86533ab10626cbb6cd2772a1a5ca0a
SHA1db043bc2cc8c0233473a07c8a9c3caed094cf8ee
SHA256abb2a5efc453a52b6c3101bb75bf38582879486e798abf1b558fa292e44cc4bf
SHA512df3c6f5d5dfbbb8ccf13e61df0c8b7c047260336dffdd98d782fe7da4f03ff2281a3d4ce3cbeafdc713fbdc70dc9e442caf97ce89c2634201e37133c715c91f1
-
Filesize
1KB
MD5453b49cc4af36d37353a748ce98f345f
SHA12edc3be9c9301e041c91c498f9232263489ee10a
SHA256d53533166df442c7a6e09880065a6be0b9e6d6a9538ed4b7ab8e94e5b17763f2
SHA512c55371b6d82cdb59926bee58225cb63d841e624c119de40db09673ca22e125bab3a743e5f29b93b2f7537a10ef98f746c870d068b5fdf0f39023d9eb02936ed9
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
Filesize
292KB
MD5a62dfcea3a58ba8fcf32f831f018fe3f
SHA175f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b
SHA256f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e
SHA5129a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603
-
Filesize
112KB
MD58b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d