Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
a3c82a5d0423dd286da22159254ce44db5fadc717abfe58240ab7bbf1acfd252.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a3c82a5d0423dd286da22159254ce44db5fadc717abfe58240ab7bbf1acfd252.dll
Resource
win10v2004-20241007-en
General
-
Target
a3c82a5d0423dd286da22159254ce44db5fadc717abfe58240ab7bbf1acfd252.dll
-
Size
936KB
-
MD5
03b5687f88d38e7633c38da183cf2136
-
SHA1
bc436ad961d5695942a16cdaf5537557303ed395
-
SHA256
a3c82a5d0423dd286da22159254ce44db5fadc717abfe58240ab7bbf1acfd252
-
SHA512
cbea474e44f0c9cff8cf9d4cc1dfcc3578bb49030668fbd0f5fdcc01cf110cb5582a833a2abeae39b17ea2366d6d2706231bfcae56c7c1db0da11039c528ec68
-
SSDEEP
12288:LPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:LtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1144-4-0x0000000002D60000-0x0000000002D61000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/276-0-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1144-23-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1144-35-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/1144-34-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/276-43-0x0000000140000000-0x00000001400EA000-memory.dmp dridex_payload behavioral1/memory/2920-53-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2920-57-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/2592-74-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral1/memory/324-90-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
Netplwiz.exeSndVol.exesdclt.exepid process 2920 Netplwiz.exe 2592 SndVol.exe 324 sdclt.exe -
Loads dropped DLL 7 IoCs
Processes:
Netplwiz.exeSndVol.exesdclt.exepid process 1144 2920 Netplwiz.exe 1144 2592 SndVol.exe 1144 324 sdclt.exe 1144 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\ACCESS~1\\0R\\SndVol.exe" -
Processes:
rundll32.exeNetplwiz.exeSndVol.exesdclt.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeNetplwiz.exepid process 276 rundll32.exe 276 rundll32.exe 276 rundll32.exe 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 2920 Netplwiz.exe 2920 Netplwiz.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1144 wrote to memory of 2776 1144 Netplwiz.exe PID 1144 wrote to memory of 2776 1144 Netplwiz.exe PID 1144 wrote to memory of 2776 1144 Netplwiz.exe PID 1144 wrote to memory of 2920 1144 Netplwiz.exe PID 1144 wrote to memory of 2920 1144 Netplwiz.exe PID 1144 wrote to memory of 2920 1144 Netplwiz.exe PID 1144 wrote to memory of 2556 1144 SndVol.exe PID 1144 wrote to memory of 2556 1144 SndVol.exe PID 1144 wrote to memory of 2556 1144 SndVol.exe PID 1144 wrote to memory of 2592 1144 SndVol.exe PID 1144 wrote to memory of 2592 1144 SndVol.exe PID 1144 wrote to memory of 2592 1144 SndVol.exe PID 1144 wrote to memory of 1952 1144 sdclt.exe PID 1144 wrote to memory of 1952 1144 sdclt.exe PID 1144 wrote to memory of 1952 1144 sdclt.exe PID 1144 wrote to memory of 324 1144 sdclt.exe PID 1144 wrote to memory of 324 1144 sdclt.exe PID 1144 wrote to memory of 324 1144 sdclt.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3c82a5d0423dd286da22159254ce44db5fadc717abfe58240ab7bbf1acfd252.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:276
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:2776
-
C:\Users\Admin\AppData\Local\sEiL0vIr\Netplwiz.exeC:\Users\Admin\AppData\Local\sEiL0vIr\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:2556
-
C:\Users\Admin\AppData\Local\gdJGcm\SndVol.exeC:\Users\Admin\AppData\Local\gdJGcm\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2592
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:1952
-
C:\Users\Admin\AppData\Local\dAc5\sdclt.exeC:\Users\Admin\AppData\Local\dAc5\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD534cdc166e2c268a6584afcffbc87befc
SHA1863c1bfbee19161e3301d8d04e3f0f652fce48e9
SHA25625bce3d3b591a1ed76aa8cc40da7efbf44c196245b02e4c83a7d84a8d8b2af32
SHA512184c083d0e49a56c56eac46febf4491607a5a291c9de1738c1ac0b90f29c9fc3dc546354a4ff02348da54aa96beee7731341c64ee6f5e6fb33a2431c3f8d7092
-
Filesize
940KB
MD55ea2eb1639cd57c1d00a70162d1e5b46
SHA1808c5076a113e2de5ec5381700d29efd3512bb87
SHA2568ab93b9730622af5a769af547b1d8b41cdfb5ad66f7ee7df41ccefcf76083e2e
SHA512f272be42b8dac08d5fdf4ef5dcd519d82fe27b96bd3310f5e160a8dc683a9cc469068da03611d52c1c5823b3c22363610cc06c8a5d7ca3de7b29f7fda2a56a7b
-
Filesize
940KB
MD5830247af9fb1a3778768d5a175488868
SHA1364884bea94f95d497071c17a2d758f52533d96f
SHA256636445927f6ee3851b1211e468ab6258c6b1b3a1fe5015d7de3d0ed926280c39
SHA512ab4ca8a6b93ccdfdcb7effa573e30bac73457b49b933fdd51052bbe987f41e94fbe76113dacf7ac3bed0bebe33c7dbe6f818319cb4353854e003798888598d30
-
Filesize
1KB
MD596d8629293da312c664b0265fe6496f3
SHA1935c5a586c6ff5c8ab3d5c297285ab2013d1c4b3
SHA25615a11748a2083f32107e8e4bc6dd059ef0fd45b7e65dba62d00832a54473846c
SHA512e3400517d1763720d92a535e8179306e9e7af3bfcb5e749ce072771a39c6276b64f5812f166d70caaba9c4941d2027f30404aa62e6d32269669d18aa311bf292
-
Filesize
1.2MB
MD5cdebd55ffbda3889aa2a8ce52b9dc097
SHA14b3cbfff5e57fa0cb058e93e445e3851063646cf
SHA25661bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd
SHA5122af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
Filesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08