Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll
Resource
win7-20240903-en
General
-
Target
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll
-
Size
936KB
-
MD5
e6080347ef82059989855367f707b6f5
-
SHA1
af2f5c40bdd1b55fde1fab97d91e5e7e12733731
-
SHA256
7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544
-
SHA512
6a58fb67a3cc61fdccbe8335309964d1c2d2cc9db2d1e47797fa0ba2de69631f71ba4499e9b65d921846832f33e358356ac917f836616d6a0d08209767f1c82b
-
SSDEEP
12288:DPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:DtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3520-3-0x0000000002B90000-0x0000000002B91000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/452-1-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/3520-23-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/3520-34-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/452-37-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral2/memory/1844-44-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/1844-49-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/2564-65-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/3888-76-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/3888-80-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
rdpinit.exeSystemPropertiesHardware.exeEaseOfAccessDialog.exepid process 1844 rdpinit.exe 2564 SystemPropertiesHardware.exe 3888 EaseOfAccessDialog.exe -
Loads dropped DLL 3 IoCs
Processes:
rdpinit.exeSystemPropertiesHardware.exeEaseOfAccessDialog.exepid process 1844 rdpinit.exe 2564 SystemPropertiesHardware.exe 3888 EaseOfAccessDialog.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tsrvevdpr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\Managed\\WORDDO~1\\BNVM2V~1\\SYSTEM~1.EXE" -
Processes:
EaseOfAccessDialog.exerundll32.exerdpinit.exeSystemPropertiesHardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EaseOfAccessDialog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3520 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3520 wrote to memory of 340 3520 rdpinit.exe PID 3520 wrote to memory of 340 3520 rdpinit.exe PID 3520 wrote to memory of 1844 3520 rdpinit.exe PID 3520 wrote to memory of 1844 3520 rdpinit.exe PID 3520 wrote to memory of 4480 3520 SystemPropertiesHardware.exe PID 3520 wrote to memory of 4480 3520 SystemPropertiesHardware.exe PID 3520 wrote to memory of 2564 3520 SystemPropertiesHardware.exe PID 3520 wrote to memory of 2564 3520 SystemPropertiesHardware.exe PID 3520 wrote to memory of 1228 3520 EaseOfAccessDialog.exe PID 3520 wrote to memory of 1228 3520 EaseOfAccessDialog.exe PID 3520 wrote to memory of 3888 3520 EaseOfAccessDialog.exe PID 3520 wrote to memory of 3888 3520 EaseOfAccessDialog.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:452
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵PID:340
-
C:\Users\Admin\AppData\Local\E2ZZd\rdpinit.exeC:\Users\Admin\AppData\Local\E2ZZd\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1844
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵PID:4480
-
C:\Users\Admin\AppData\Local\2si0i8Z\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\2si0i8Z\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2564
-
C:\Windows\system32\EaseOfAccessDialog.exeC:\Windows\system32\EaseOfAccessDialog.exe1⤵PID:1228
-
C:\Users\Admin\AppData\Local\Qcwy9LB\EaseOfAccessDialog.exeC:\Users\Admin\AppData\Local\Qcwy9LB\EaseOfAccessDialog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD56b6a3461e9828104534dc6eb92b5a525
SHA1412552c7bca59c51e984b340f1ca7852da336f2f
SHA256a9b4bb9670ebe4c3ab2bc6bbd7291987ccdb07fb9b9f6739fb783e4a6a262ca0
SHA512b53109cbb4e661a27bb539092e7c261da5ed70a339ea6d6af489b6724f0f534759e8836a9237f6364a7d63980719f0be6b152038507cdd075c8f5c90af5f1d6d
-
Filesize
82KB
MD5bf5bc0d70a936890d38d2510ee07a2cd
SHA169d5971fd264d8128f5633db9003afef5fad8f10
SHA256c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7
SHA5120e129044777cbbf5ea995715159c50773c1818fc5e8faa5c827fd631b44c086b34dfdcbe174b105891ccc3882cc63a8664d189fb6a631d8f589de4e01a862f51
-
Filesize
940KB
MD579f8449fc858d178ab255dd6cfcc08e8
SHA1cc9417b75f46c744c694521ef4621e2fb664b7f6
SHA2568b4daf2fd95cc6d4a7974f6309afb9637538f081483f385d37fb3f52f6d351a5
SHA512a5131f9d65e43da9d297867b66ede9e95d96eba8bf0fee8f152dd1734aa6f805aec441f958e535e70352e01d6ea052d6b9b4d873708e0794a0a42d6fadfcf22a
-
Filesize
343KB
MD5b0ecd76d99c5f5134aeb52460add6f80
SHA151462078092c9d6b7fa2b9544ffe0a49eb258106
SHA25651251863097f7c80ef59606152ec59e7522881c8e3886c194c43f56bcab92e1b
SHA51216855c7db48b26297c78d37d52ad03f6af0f5a58e333e17ad83b34f5e8b200c5517c6481043af0ecf1b962af2378f38600bd968592f4e1018b5a1b9400adb367
-
Filesize
1.2MB
MD5e4e8c6a385f63037a872f93b2396f6c2
SHA1a501d50c31fc435ac612437fd76a00c29adf483d
SHA2566475c00a1f90610e1e5e7589d42829b5567a72913bbc36dae5079ed4d16434da
SHA51225be4eef9b2f03e3aca437fd44f226a69569317c0a4310428d5d34f3575c55286b4a60f83455987ed9aeb029f82a54a14c4ed3a57aabb17bebb215c36d7fc3be
-
Filesize
123KB
MD5e75ee992c1041341f709a517c8723c87
SHA1471021260055eac0021f0abffa2d0ba77a2f380e
SHA2560b1731562413eaa972b373cd7388c644a3059940ce67eb89668e4073f3e068dc
SHA51248c3a8531df6bcc5077367cdf32af104c94cf7701118a85e8beabba2e9c4f511ae14e47b6d1b57d11a2bc1e8b4f6d5bacae27a8d16fcd09a8f9e0018f5a6370a
-
Filesize
1KB
MD5814142c9d75a23d0267f949e63f25409
SHA1c52e57ba65624606db148f21c055f8c180f2fa9f
SHA256082dd9bbef030dc6b30d5f4471dde84ee1ac3d05e18cb011364a4fd6f71e1f62
SHA5125a655b6c7bb506299f5d00d397bcb4703d855dcecbb7d9252dbbcf4515c770d3ae12fc0b5d7425ac61af4b6192df966a6a2a872a25103e3c8f28f5be584af674