Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
1a8536a5bb678f5273e7995d810ef105a82d062219e09a7b6f4b632e2532b020.dll
Resource
win7-20240729-en
General
-
Target
1a8536a5bb678f5273e7995d810ef105a82d062219e09a7b6f4b632e2532b020.dll
-
Size
940KB
-
MD5
a0cb297fd3181bda59066db2281fb496
-
SHA1
7ba6d4a54cd899bf575da748def486be7dffc70d
-
SHA256
1a8536a5bb678f5273e7995d810ef105a82d062219e09a7b6f4b632e2532b020
-
SHA512
3ace28434cf67dcda52b3f6f7bacf03f97e92d76e4d0b69f9e3759c50f0b236f0e673b396a2b255706864bf25409212eafde50ac6374155f2c15c856bcd87390
-
SSDEEP
12288:YPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:YtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1236-4-0x0000000002AE0000-0x0000000002AE1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2380-0-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1236-24-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1236-35-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1236-38-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2380-44-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1360-53-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1360-58-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/568-70-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral1/memory/568-75-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral1/memory/1076-91-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1360 slui.exe 568 dpapimig.exe 1076 msra.exe -
Loads dropped DLL 7 IoCs
pid Process 1236 Process not Found 1360 slui.exe 1236 Process not Found 568 dpapimig.exe 1236 Process not Found 1076 msra.exe 1236 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\MEDIAC~1\\43L2uV\\dpapimig.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 rundll32.exe 2380 rundll32.exe 2380 rundll32.exe 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2668 1236 Process not Found 29 PID 1236 wrote to memory of 2668 1236 Process not Found 29 PID 1236 wrote to memory of 2668 1236 Process not Found 29 PID 1236 wrote to memory of 1360 1236 Process not Found 30 PID 1236 wrote to memory of 1360 1236 Process not Found 30 PID 1236 wrote to memory of 1360 1236 Process not Found 30 PID 1236 wrote to memory of 784 1236 Process not Found 31 PID 1236 wrote to memory of 784 1236 Process not Found 31 PID 1236 wrote to memory of 784 1236 Process not Found 31 PID 1236 wrote to memory of 568 1236 Process not Found 32 PID 1236 wrote to memory of 568 1236 Process not Found 32 PID 1236 wrote to memory of 568 1236 Process not Found 32 PID 1236 wrote to memory of 1320 1236 Process not Found 33 PID 1236 wrote to memory of 1320 1236 Process not Found 33 PID 1236 wrote to memory of 1320 1236 Process not Found 33 PID 1236 wrote to memory of 1076 1236 Process not Found 34 PID 1236 wrote to memory of 1076 1236 Process not Found 34 PID 1236 wrote to memory of 1076 1236 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a8536a5bb678f5273e7995d810ef105a82d062219e09a7b6f4b632e2532b020.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2668
-
C:\Users\Admin\AppData\Local\SSkorr\slui.exeC:\Users\Admin\AppData\Local\SSkorr\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1360
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:784
-
C:\Users\Admin\AppData\Local\kOQE1O\dpapimig.exeC:\Users\Admin\AppData\Local\kOQE1O\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:568
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:1320
-
C:\Users\Admin\AppData\Local\0ak\msra.exeC:\Users\Admin\AppData\Local\0ak\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD548ed7aedc6caa751f504ac8c44c83eeb
SHA157697aec4fd08705683bc737e00d00dd494c9b21
SHA256540046b2dcf365caf14bc52e9aaa1f1100df9dafc3d04221f8c5a1f98a64b9d5
SHA512988185c89fa24b92523380abf5cf0fc088aa83cc7f91c589c178c56bc95c70b278b9b38ec6c589cad1a553e38e993fb5221b4d8bfd08359507d0ec9c849e0e85
-
Filesize
636KB
MD5e79df53bad587e24b3cf965a5746c7b6
SHA187a97ec159a3fc1db211f3c2c62e4d60810e7a70
SHA2564e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d
SHA5129a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb
-
Filesize
944KB
MD578843ed86fc755b000ecf8e5f98bc672
SHA193e8c05f5dee5cecfc61522ad4f66790a61c49e1
SHA256809f37a1e67498e4a65ad68db8d6a6c2ad2872c4f20a897aad87e119612f6d04
SHA512d3984f130437cf3cf58d024be33f4e2a0fe8cec8f18a020b37b60c4e3a628813bd34d4d49cb6bd95230c77089112ea9ddff7e90299ff15a096d76ed7978b65c7
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
Filesize
1.1MB
MD5a7eb27e7f49dc292ce30254511f2d587
SHA13399c4fd68f8fdbb7a72ae874d0577058f5d02dc
SHA25611d40c5dae9fcaa5bcd60c9d687997c5926846a14894d62616d1222176ce256e
SHA512f843c3ae3da1247648e73a7f44484af152a6907987c1ad3327ba2f65b42e5fcd658a94e8da48f09c477453c6f7d88bdf616b53066f8a0d9ce8ab1927c20ef391
-
Filesize
1KB
MD5f9bb7f3f218d3982ea7e2fe0cc37505c
SHA137ad977397fe649005e8d76696f1e43f86e0ecab
SHA256364593f430ee017a959399dbd904bbdc8692ee2c2c067d1133d3be1ec5740dcd
SHA5126824773adb6923e6221c2d2d18d63e39f8e141cba4ab4d8052657edff3ab318ca1aa7686e421ff22db1205c656cc53e80860af2a42d43735b0075400f92e3602
-
Filesize
73KB
MD50e8b8abea4e23ddc9a70614f3f651303
SHA16d332ba4e7a78039f75b211845514ab35ab467b2
SHA25666fc6b68e54b8840a38b4de980cc22aed21009afc1494a9cc68e892329f076a1
SHA5124feded78f9b953472266693e0943030d00f82a5cc8559df60ae0479de281164155e19687afc67cba74d04bb9ad092f5c7732f2d2f9b06274ca2ae87dc2d4a6dc