Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
5dd8bbc2a06f32e7ae85158d378bf1c6ca1a03c766d36a350329958f02a77ffd.dll
Resource
win7-20240729-en
General
-
Target
5dd8bbc2a06f32e7ae85158d378bf1c6ca1a03c766d36a350329958f02a77ffd.dll
-
Size
1.2MB
-
MD5
add78f4a51bc5a019c357ceb81094996
-
SHA1
1d908cdabfa232ac577ed7ad302a4e774aa472e0
-
SHA256
5dd8bbc2a06f32e7ae85158d378bf1c6ca1a03c766d36a350329958f02a77ffd
-
SHA512
83b3429bc0871d28c48db7db15d44fe65e7b02fa9609fd9b357f571059c466743fa355b88163e48d36c7e9c8f16ff03080781feb282a5770d51c8bf5ba545298
-
SSDEEP
12288:hPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8xy:htKTrsKSKBTSb6DUXWq8x
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3356-3-0x0000000002D40000-0x0000000002D41000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/3512-2-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/3356-35-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/3356-24-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/3512-38-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral2/memory/4504-45-0x0000000140000000-0x0000000140132000-memory.dmp dridex_payload behavioral2/memory/4504-50-0x0000000140000000-0x0000000140132000-memory.dmp dridex_payload behavioral2/memory/2872-66-0x0000000140000000-0x0000000140132000-memory.dmp dridex_payload behavioral2/memory/3772-77-0x0000000140000000-0x0000000140131000-memory.dmp dridex_payload behavioral2/memory/3772-81-0x0000000140000000-0x0000000140131000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
PresentationSettings.exebdeunlock.exeOptionalFeatures.exepid process 4504 PresentationSettings.exe 2872 bdeunlock.exe 3772 OptionalFeatures.exe -
Loads dropped DLL 3 IoCs
Processes:
PresentationSettings.exebdeunlock.exeOptionalFeatures.exepid process 4504 PresentationSettings.exe 2872 bdeunlock.exe 3772 OptionalFeatures.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qiqbxsgjw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\CloudStore\\hGmf1\\bdeunlock.exe" -
Processes:
rundll32.exePresentationSettings.exebdeunlock.exeOptionalFeatures.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdeunlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OptionalFeatures.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3512 rundll32.exe 3512 rundll32.exe 3512 rundll32.exe 3512 rundll32.exe 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3356 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3356 wrote to memory of 1036 3356 PresentationSettings.exe PID 3356 wrote to memory of 1036 3356 PresentationSettings.exe PID 3356 wrote to memory of 4504 3356 PresentationSettings.exe PID 3356 wrote to memory of 4504 3356 PresentationSettings.exe PID 3356 wrote to memory of 5092 3356 bdeunlock.exe PID 3356 wrote to memory of 5092 3356 bdeunlock.exe PID 3356 wrote to memory of 2872 3356 bdeunlock.exe PID 3356 wrote to memory of 2872 3356 bdeunlock.exe PID 3356 wrote to memory of 3488 3356 OptionalFeatures.exe PID 3356 wrote to memory of 3488 3356 OptionalFeatures.exe PID 3356 wrote to memory of 3772 3356 OptionalFeatures.exe PID 3356 wrote to memory of 3772 3356 OptionalFeatures.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5dd8bbc2a06f32e7ae85158d378bf1c6ca1a03c766d36a350329958f02a77ffd.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵PID:1036
-
C:\Users\Admin\AppData\Local\XHy0HD\PresentationSettings.exeC:\Users\Admin\AppData\Local\XHy0HD\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4504
-
C:\Windows\system32\bdeunlock.exeC:\Windows\system32\bdeunlock.exe1⤵PID:5092
-
C:\Users\Admin\AppData\Local\XM3\bdeunlock.exeC:\Users\Admin\AppData\Local\XM3\bdeunlock.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2872
-
C:\Windows\system32\OptionalFeatures.exeC:\Windows\system32\OptionalFeatures.exe1⤵PID:3488
-
C:\Users\Admin\AppData\Local\d2d9C5Qhz\OptionalFeatures.exeC:\Users\Admin\AppData\Local\d2d9C5Qhz\OptionalFeatures.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5790799a168c41689849310f6c15f98fa
SHA1a5d213fc1c71a56de9441b2e35411d83770c01ec
SHA2566e59ab1a0b4ac177dc3397a54afcf68fcea3c1ee72c33bd08c89f04a6dac64b8
SHA5128153b79d4681f21ade7afe995841c386bff8e491ad347f8e7c287df5f9053cae7458e273339146d9a920ceaa2ba0f41cc793d7b2c0fa80efbb41477d39470866
-
Filesize
1.2MB
MD5c065b71de2701e39b4fb3142e2146359
SHA17039a1974bf31c2c9521bd88e30b360815840f68
SHA256fb6bc9c87478d89386118e6edb5b85b30fe2628632c71a200b575ba20419342e
SHA5121a007f64690bf8b94098b8c88e17b3581c5cfac490ceacc71cc81a4c484e8dd210f8db75dc29fa3d3cccdd080285e7f293ecc9414e3c26319cd5db82e30fd3e4
-
Filesize
1.2MB
MD56752b1457e51d1ecdb87e4581ccbc1a6
SHA13615e0d0e545324cf690902c91dfb9f1eec75d63
SHA256a2b6eb30613ddc8eb3a4541813f2b54346486364028a9619c9d2a54eb9dd6a41
SHA51233ca56734f3ec3ca33b12316e57175ccb6142a733bf5b97e8fbee2871f26407f373d88c47ac72f2af0cd283ac728c9bf70685e2e5301c6cd7052722534b37dd0
-
Filesize
279KB
MD5fef5d67150c249db3c1f4b30a2a5a22e
SHA141ca037b0229be9338da4d78244b4f0ea5a3d5f3
SHA256dcfdd67bf3244ff86cadaaea50b43cce5479014ea2021c0c2fb40b7c856e5603
SHA5124ded9ca87d9d30c31ab2baededaa6e26681741ea1742d80c318173536c643a01bc049e03a03c3b45b3cb8860464a855830e12e87670503e65eedcdd5e9b2d1e7
-
Filesize
110KB
MD5d6cd8bef71458804dbc33b88ace56372
SHA1a18b58445be2492c5d37abad69b5aa0d29416a60
SHA256fa2e741416994f2c1bf9ef7a16b9c4dbf20c84267e3da91ae6f1ad75ee9f49b8
SHA5121bed8af2cf99a7f3bb36a34f4a71c34787904bd072ecdc731fb7498290dcf4024b956fb8b6912ad050b74aa861f0b0349081b77088f72732bda5075413b1f83d
-
Filesize
1.2MB
MD5cb0953a424a3e1ac635037ebf558beac
SHA146a48cd8a470ce58bc49f9b0150262abae84494d
SHA256cf55dd1120b790ec973f9d2df8fc293c8c50e38be8f4ccf2e2755b580107569e
SHA5120f7eec39d07ee055344c05b2fe7b1ac2faf824477c15929b6c78fca3094da74fe2b92f3f5c224bd9dd85c29dd587f1b255345cfa5bc2353cc3e513a0aedc8847
-
Filesize
1KB
MD51c854d2c65583b45d10a951187fb36ef
SHA140fd88495bed40d389b4623a9462e42600a316c5
SHA256422ff1eb5b6aea17769820f4fb5cef55fd859c84ca540e7770052ce8fbf94685
SHA512abce4a1491ffc19c4ad87e95d79dc633932f43aec258f0aacae6376297cf2c57f3c5dc248e3c270f288109ebc06e4e9eca044e31de5e612735ca054c703a054f