Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 18:06
Static task
static1
Behavioral task
behavioral1
Sample
06618db79b292fe5270cdf536e70181a66533021d5fba89cf6cee8151e28830a.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06618db79b292fe5270cdf536e70181a66533021d5fba89cf6cee8151e28830a.dll
Resource
win10v2004-20241007-en
General
-
Target
06618db79b292fe5270cdf536e70181a66533021d5fba89cf6cee8151e28830a.dll
-
Size
940KB
-
MD5
4c744bdf154706d67cce0294ea1c301c
-
SHA1
177a8dd5df4aba873b8c29d2d2f52d7188204de0
-
SHA256
06618db79b292fe5270cdf536e70181a66533021d5fba89cf6cee8151e28830a
-
SHA512
76481e9906d7c8225a77e6d87622c9f79fe5bd3f44f22a04487747a15f2966f0cab259a94f7ed9cd08f05203bccff6d4001e143a6420910a8c96c879bb30e61a
-
SSDEEP
12288:wPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:wtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1196-4-0x0000000002D20000-0x0000000002D21000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2348-0-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1196-24-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1196-35-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1196-36-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2348-44-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2852-54-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2852-58-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1864-74-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2632-90-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2852 unregmp2.exe 1864 DisplaySwitch.exe 2632 osk.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 Process not Found 2852 unregmp2.exe 1196 Process not Found 1864 DisplaySwitch.exe 1196 Process not Found 2632 osk.exe 1196 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rtunysabu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\V9AuWZyD\\DisplaySwitch.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2860 1196 Process not Found 31 PID 1196 wrote to memory of 2860 1196 Process not Found 31 PID 1196 wrote to memory of 2860 1196 Process not Found 31 PID 1196 wrote to memory of 2852 1196 Process not Found 32 PID 1196 wrote to memory of 2852 1196 Process not Found 32 PID 1196 wrote to memory of 2852 1196 Process not Found 32 PID 1196 wrote to memory of 2596 1196 Process not Found 33 PID 1196 wrote to memory of 2596 1196 Process not Found 33 PID 1196 wrote to memory of 2596 1196 Process not Found 33 PID 1196 wrote to memory of 1864 1196 Process not Found 34 PID 1196 wrote to memory of 1864 1196 Process not Found 34 PID 1196 wrote to memory of 1864 1196 Process not Found 34 PID 1196 wrote to memory of 1252 1196 Process not Found 35 PID 1196 wrote to memory of 1252 1196 Process not Found 35 PID 1196 wrote to memory of 1252 1196 Process not Found 35 PID 1196 wrote to memory of 2632 1196 Process not Found 36 PID 1196 wrote to memory of 2632 1196 Process not Found 36 PID 1196 wrote to memory of 2632 1196 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06618db79b292fe5270cdf536e70181a66533021d5fba89cf6cee8151e28830a.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:2860
-
C:\Users\Admin\AppData\Local\3mauGn\unregmp2.exeC:\Users\Admin\AppData\Local\3mauGn\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2852
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵PID:2596
-
C:\Users\Admin\AppData\Local\FIpX9AKz\DisplaySwitch.exeC:\Users\Admin\AppData\Local\FIpX9AKz\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1864
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵PID:1252
-
C:\Users\Admin\AppData\Local\RYYFA\osk.exeC:\Users\Admin\AppData\Local\RYYFA\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD58f41fd1216d4879321844b5b0a2b1767
SHA1d806aacfebd85f9b4880db25be3bc129a8226275
SHA256d69aee7e6d603f8d3cd904a92078caa89d6feafdaa4629c60685e97ae37b162d
SHA512c8d4b823887d183f194113315346432471c37388242065ae88cfb56578d95fe5396b8655812582b8ebc7f1e17638d506c7af1dd178f9db6e1b56d7a12c580018
-
Filesize
944KB
MD5bb3cd97af2ba2b2ecf1183936dfb0981
SHA1dce566f4c97413a886e4dab662c550233ede0f5c
SHA2561c86a13685ddd7edcc6b867d1931f8a28063150b6ce8a3103b101559b0e0b0db
SHA5128948bb721a98e859b0fb4543cc3601732fe882472f275ed5cab1dc2ed49f8b208c73df4d1abd5da2f8d5a9dd68f10476112488a369080dc723bf929a97489b5f
-
Filesize
944KB
MD5e2478c4633aa037f15e751d8d53610c0
SHA153fdc8fef8f7293456a6928b6a2e225c6411a5f9
SHA256853fd2a689b82b92bf098efd5c96c9c236cd1e7821b7b4dfbf6c90cd24a7def4
SHA51264c694919088a717fc64286be3a33ddc575f20a2d0ccbc766588b67904060cf3a1c27af2b6e9e4e48e38f2a58d2ddfc9f43a7baa342392ca2d8b01e79a6ab02b
-
Filesize
1KB
MD5c7bb59675a4bcf17baf4e8415035270c
SHA1652ca9936931aa1793a49ac2f934ea75cc8c7555
SHA2568ec8df53d8ebb1d409e9ddea6392ddc34d1bed05e2f927365ca7d77e9c1e1059
SHA512b93b5e43a987721c735b0d79e9f8120d7c17c5d3b3ade3994db7a34ccfe38c4e172334fbde11d444309d5933d54f5d2554400e8d6ead42c7062ed631b961783b
-
Filesize
316KB
MD564b328d52dfc8cda123093e3f6e4c37c
SHA1f68f45b21b911906f3aa982e64504e662a92e5ab
SHA2567d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1
SHA512e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00
-
Filesize
517KB
MD5b795e6138e29a37508285fc31e92bd78
SHA1d0fe0c38c7c61adbb77e58d48b96cd4bf98ecd4a
SHA25601a9733871baa8518092bade3fce62dcca14cdf6fc55b98218253580b38d7659
SHA5128312174a77bab5fef7c4e9efff66c43d3515b02f5766ed1d3b9bd0abb3d7344a9a22cbac228132098428c122293d2b1898b3a2d75f5e4247b1dcb9aa9c7913b1
-
Filesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1