Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 18:06
Static task
static1
Behavioral task
behavioral1
Sample
486becacbf7f93c89448318ceacafc3fff79c6caa82e3daf4091857b33326a57.dll
Resource
win7-20240903-en
General
-
Target
486becacbf7f93c89448318ceacafc3fff79c6caa82e3daf4091857b33326a57.dll
-
Size
940KB
-
MD5
11be54b786128e0cd33b731becbbdf42
-
SHA1
125ab787fdffe99ef10701ffc3b39f651324a9b5
-
SHA256
486becacbf7f93c89448318ceacafc3fff79c6caa82e3daf4091857b33326a57
-
SHA512
10b4229d9a37c2d1b2514c27c4e6525512220f29e6e056d47a1211720829a7edd5a7c996b7c29def21cc6296a96120b907725d8b78bff5686ce809ad9628d920
-
SSDEEP
12288:gPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:gtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1132-4-0x0000000002970000-0x0000000002971000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2236-0-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1132-24-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1132-36-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1132-35-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2236-44-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2604-53-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2604-57-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2500-74-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1256-90-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
SndVol.exeBitLockerWizard.exeDWWIN.EXEpid process 2604 SndVol.exe 2500 BitLockerWizard.exe 1256 DWWIN.EXE -
Loads dropped DLL 7 IoCs
Processes:
SndVol.exeBitLockerWizard.exeDWWIN.EXEpid process 1132 2604 SndVol.exe 1132 2500 BitLockerWizard.exe 1132 1256 DWWIN.EXE 1132 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\FLASHP~1\\8Cym\\BITLOC~1.EXE" -
Processes:
rundll32.exeSndVol.exeBitLockerWizard.exeDWWIN.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2236 rundll32.exe 2236 rundll32.exe 2236 rundll32.exe 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 1132 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1132 wrote to memory of 2492 1132 SndVol.exe PID 1132 wrote to memory of 2492 1132 SndVol.exe PID 1132 wrote to memory of 2492 1132 SndVol.exe PID 1132 wrote to memory of 2604 1132 SndVol.exe PID 1132 wrote to memory of 2604 1132 SndVol.exe PID 1132 wrote to memory of 2604 1132 SndVol.exe PID 1132 wrote to memory of 2484 1132 BitLockerWizard.exe PID 1132 wrote to memory of 2484 1132 BitLockerWizard.exe PID 1132 wrote to memory of 2484 1132 BitLockerWizard.exe PID 1132 wrote to memory of 2500 1132 BitLockerWizard.exe PID 1132 wrote to memory of 2500 1132 BitLockerWizard.exe PID 1132 wrote to memory of 2500 1132 BitLockerWizard.exe PID 1132 wrote to memory of 2260 1132 DWWIN.EXE PID 1132 wrote to memory of 2260 1132 DWWIN.EXE PID 1132 wrote to memory of 2260 1132 DWWIN.EXE PID 1132 wrote to memory of 1256 1132 DWWIN.EXE PID 1132 wrote to memory of 1256 1132 DWWIN.EXE PID 1132 wrote to memory of 1256 1132 DWWIN.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\486becacbf7f93c89448318ceacafc3fff79c6caa82e3daf4091857b33326a57.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:2492
-
C:\Users\Admin\AppData\Local\99I\SndVol.exeC:\Users\Admin\AppData\Local\99I\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2604
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:2484
-
C:\Users\Admin\AppData\Local\wAvQFqmd2\BitLockerWizard.exeC:\Users\Admin\AppData\Local\wAvQFqmd2\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2500
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵PID:2260
-
C:\Users\Admin\AppData\Local\MVd\DWWIN.EXEC:\Users\Admin\AppData\Local\MVd\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD5e690e40f73bbf61e1467beab34d5557e
SHA1893f3f86d68644b54dcbc96b9bd1358f16c805a8
SHA25690b83b92e09625414493a53bd9ef5d8797d376b4f2332bb24a9bbf125265ff69
SHA5129d6e45a54e60bc4738aa8e4d547fb77497bce1dc7b2eb5b732297a254f0aaabad1c1f7e078a51991d85311f909bf64fbd06cf58afea0f6b7ca9cc52a0fbe380a
-
Filesize
149KB
MD525247e3c4e7a7a73baeea6c0008952b1
SHA18087adb7a71a696139ddc5c5abc1a84f817ab688
SHA256c740497a7e58f7678e25b68b03573b4136a364464ee97c02ce5e0fe00cec7050
SHA512bc27946894e7775f772ac882740430c8b9d3f37a573e2524207f7bb32f44d4a227cb1e9a555e118d68af7f1e129abd2ac5cabbcd8bbf3551c485bae05108324b
-
Filesize
944KB
MD5cdd4176035fff73f152648ed5a7ff7ec
SHA1f3ec434955bf94b591b7b06e002b07856880a29e
SHA256c80dfe8fda86b8edd21dc97a7f0bec42a431e6608af892f472c04e5b9675bd88
SHA512141442ca3da71b656f0069b8647026609a730231ebb122308d19e2329ddaea4013668dd1b7d10a141f8899b8835db1da4d52ff1dcd58e31e446156bf48bb1e90
-
Filesize
944KB
MD563024cc6eaed801b4282c3a5679c7c42
SHA106d387c39460bbc68cb0c915af64482d4e4e95d9
SHA2565c637e35b28e47d4fbd12083cf38990dc5e98893d28c8bb505bd8fffc06ff912
SHA512fa0a42e30eb888cd367715dac07b4aa523af0bf68cee3b51302fc0d5205ea8f58cac54dcb5de2549ca36c96b771e4a9ca57267db14c10ed1779cf3267452ab26
-
Filesize
1003B
MD504ef9e41ba044178d3aeb14bacdf56b9
SHA1c973d2170bb54468c2e1508bfa5ba3ca583687de
SHA25635105a695a0f0b628011d8e1249fde9de48c2ebd3033c6459bf87e900991439d
SHA512c1bc93722536091140118ca49d73eb14fb6113c7191c70f80917e826e4b9680d12e425fbe1d8a26b25e27cc669cde87f4ddd515d9107b9e2ba005782f581a404
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
Filesize
98KB
MD508a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9