Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 18:06
Static task
static1
Behavioral task
behavioral1
Sample
e9e528ce64fe548d5315d36d4ae765585f2c28f58104c3d579377e79862cd6b8.dll
Resource
win7-20241010-en
General
-
Target
e9e528ce64fe548d5315d36d4ae765585f2c28f58104c3d579377e79862cd6b8.dll
-
Size
940KB
-
MD5
d63ff00d75923760db3db59ad66520ee
-
SHA1
698ef541cd9d32955422d8af16fdbc2437039bd0
-
SHA256
e9e528ce64fe548d5315d36d4ae765585f2c28f58104c3d579377e79862cd6b8
-
SHA512
347238b6dbe7c5a1b9e4610a5d3b2b9f93ca34a3999c21b1257ccec507bcb1a4d792164f6461fde911147b1cff20e817d575e7c7e10406b9c00fabaf0372b1e2
-
SSDEEP
12288:gPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:gtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1188-4-0x0000000002BA0000-0x0000000002BA1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/3012-1-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1188-24-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1188-36-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/1188-35-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/3012-44-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2740-54-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral1/memory/2740-58-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral1/memory/1300-71-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/1300-75-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral1/memory/2828-91-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
msinfo32.exeperfmon.exepsr.exepid Process 2740 msinfo32.exe 1300 perfmon.exe 2828 psr.exe -
Loads dropped DLL 7 IoCs
Processes:
msinfo32.exeperfmon.exepsr.exepid Process 1188 2740 msinfo32.exe 1188 1300 perfmon.exe 1188 2828 psr.exe 1188 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kgvptlq = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\tbAg\\perfmon.exe" -
Processes:
perfmon.exepsr.exerundll32.exemsinfo32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 3012 rundll32.exe 3012 rundll32.exe 3012 rundll32.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1188 wrote to memory of 2900 1188 29 PID 1188 wrote to memory of 2900 1188 29 PID 1188 wrote to memory of 2900 1188 29 PID 1188 wrote to memory of 2740 1188 30 PID 1188 wrote to memory of 2740 1188 30 PID 1188 wrote to memory of 2740 1188 30 PID 1188 wrote to memory of 540 1188 31 PID 1188 wrote to memory of 540 1188 31 PID 1188 wrote to memory of 540 1188 31 PID 1188 wrote to memory of 1300 1188 32 PID 1188 wrote to memory of 1300 1188 32 PID 1188 wrote to memory of 1300 1188 32 PID 1188 wrote to memory of 2660 1188 33 PID 1188 wrote to memory of 2660 1188 33 PID 1188 wrote to memory of 2660 1188 33 PID 1188 wrote to memory of 2828 1188 34 PID 1188 wrote to memory of 2828 1188 34 PID 1188 wrote to memory of 2828 1188 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9e528ce64fe548d5315d36d4ae765585f2c28f58104c3d579377e79862cd6b8.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵PID:2900
-
C:\Users\Admin\AppData\Local\zSwv3\msinfo32.exeC:\Users\Admin\AppData\Local\zSwv3\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2740
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:540
-
C:\Users\Admin\AppData\Local\Zw9o\perfmon.exeC:\Users\Admin\AppData\Local\Zw9o\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1300
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2660
-
C:\Users\Admin\AppData\Local\4qGcDxSvx\psr.exeC:\Users\Admin\AppData\Local\4qGcDxSvx\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD5127258ff8141437579f1779e3e6ee16c
SHA1c52571796578ded9bac6682666f716ae7f296e0f
SHA25664f0f4229b8d113871cb0571e1d122d2c6020512eb1530334ba72cb184c564cc
SHA5124bfd43ea471a3ba9cad5fb0399d6d420b23aaf43eab854c27d599203cc2d88280e56daab17cc12212c662098d64e5dd72609f77fb0d84bf04e173e253d3c9700
-
Filesize
944KB
MD5ef66e1910fed38ea6cba89e6e8355f62
SHA14cd9dece7a83959a6edc9a01bd630aa3b2d333f5
SHA2564c382d7d82bcc4f8a3dd30067d5a3be5727076ec09526841e0a1216ea7c873e0
SHA512db858427ec0d8547deea0b13d9698f37b9d05c56aa70734c85a8b7851ff6cce9cbf96eb8da2b855924d477843cee0e3b9e4df1b052e2f8504dfcdbdaa08439d1
-
Filesize
968KB
MD5f01d3427ce921e16d4885309d00e1334
SHA1f95771a8ecf554ecee55b7ccf42c67410f301404
SHA2563b29f80bb595b4ced957e4e1375c14e4d3d564773a9100e6de1f1773c829facf
SHA5124b3e383d8f191ec4fe17595cb32fb9ae95b0a78c2a79735dd079262d7312e68dd184d596b658b8c7eb7590fe64e690e7d50179fbe338ec5ebd32eef8f6f6bc18
-
Filesize
1KB
MD5f6a8c1dd480b13813ceaae136c4585dc
SHA101d3449dcdf9263c4f265e22639f110fcf917c08
SHA256ecfd4817d3f428522af98b6f63cb4f1d1c26cd80e727b2bd1624c29579d2c2f2
SHA51290eab8a92315cb73df9d4424381c3b570070b7b6255fcaea25a3a8cd8e711028e11165b38598bcf1910800e9bc509368b8429a9a5a1fc271afb89bff4fca1e2f
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
Filesize
370KB
MD5d291620d4c51c5f5ffa62ccdc52c5c13
SHA12081c97f15b1c2a2eadce366baf3c510da553cc7
SHA25676e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae
SHA51275f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b