Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
44b1063452fdb12ba26b5e6c2b2b1f71330b165f1ab8cbb2f199c048f519e8cb.dll
Resource
win7-20240903-en
General
-
Target
44b1063452fdb12ba26b5e6c2b2b1f71330b165f1ab8cbb2f199c048f519e8cb.dll
-
Size
940KB
-
MD5
2d9b177ec1f707009b9a808af771d99a
-
SHA1
a390ee7e32d4c73c0eca3b23134cd990684d4a67
-
SHA256
44b1063452fdb12ba26b5e6c2b2b1f71330b165f1ab8cbb2f199c048f519e8cb
-
SHA512
bcc1b7b6a32d43adfb20e81b095d842a1d7c0e197a1f742189cfbdd6fe96f24336f39de968f304ab7955ce66197aaf9ff3a99e12252eadd5adfe6ee6b94849d7
-
SSDEEP
12288:CPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:CtKTrsKSKBTSb6DUXWq8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3436-3-0x0000000000D10000-0x0000000000D11000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/1768-1-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/3436-24-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/3436-35-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/1768-38-0x0000000140000000-0x00000001400EB000-memory.dmp dridex_payload behavioral2/memory/2124-46-0x000002876D5A0000-0x000002876D68C000-memory.dmp dridex_payload behavioral2/memory/2124-51-0x000002876D5A0000-0x000002876D68C000-memory.dmp dridex_payload behavioral2/memory/868-62-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral2/memory/868-66-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral2/memory/4444-78-0x0000000140000000-0x00000001400ED000-memory.dmp dridex_payload behavioral2/memory/4444-80-0x0000000140000000-0x00000001400ED000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2124 PresentationHost.exe 868 psr.exe 4444 mmc.exe -
Loads dropped DLL 4 IoCs
pid Process 2124 PresentationHost.exe 2124 PresentationHost.exe 868 psr.exe 4444 mmc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rrsphmonwo = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\XOGNRH~1\\psr.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1768 regsvr32.exe 1768 regsvr32.exe 1768 regsvr32.exe 1768 regsvr32.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3436 wrote to memory of 516 3436 Process not Found 88 PID 3436 wrote to memory of 516 3436 Process not Found 88 PID 3436 wrote to memory of 2124 3436 Process not Found 89 PID 3436 wrote to memory of 2124 3436 Process not Found 89 PID 3436 wrote to memory of 628 3436 Process not Found 90 PID 3436 wrote to memory of 628 3436 Process not Found 90 PID 3436 wrote to memory of 868 3436 Process not Found 91 PID 3436 wrote to memory of 868 3436 Process not Found 91 PID 3436 wrote to memory of 1484 3436 Process not Found 92 PID 3436 wrote to memory of 1484 3436 Process not Found 92 PID 3436 wrote to memory of 4444 3436 Process not Found 93 PID 3436 wrote to memory of 4444 3436 Process not Found 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\44b1063452fdb12ba26b5e6c2b2b1f71330b165f1ab8cbb2f199c048f519e8cb.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
C:\Windows\system32\PresentationHost.exeC:\Windows\system32\PresentationHost.exe1⤵PID:516
-
C:\Users\Admin\AppData\Local\6qSTg6\PresentationHost.exeC:\Users\Admin\AppData\Local\6qSTg6\PresentationHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2124
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:628
-
C:\Users\Admin\AppData\Local\t8QUy\psr.exeC:\Users\Admin\AppData\Local\t8QUy\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:868
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵PID:1484
-
C:\Users\Admin\AppData\Local\LpODb0Fvl\mmc.exeC:\Users\Admin\AppData\Local\LpODb0Fvl\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5ef27d65b92d89e8175e6751a57ed9d93
SHA17279b58e711b459434f047e9098f9131391c3778
SHA25617d6dcfaced6873a4ac0361ff14f48313f270ac9c465e9f02b5c12b5a5274c48
SHA51240f46c3a131bb0388b8a3f7aee422936f6e2aa8d2cda547c43c4e7979c163d06c5aa20033a5156d3eeee5d455eeb929cbce89bcc8bb1766cbb65d7f03dd23e2e
-
Filesize
944KB
MD55b00738ee75678fc5a156b31d7c8b156
SHA15dcfc0e4682870d0f2fb0c39d99474be7e77d30a
SHA25626402da61ff14db495fd28e5415f2c2087adbefbcee4292b5637d9459fa6e2fa
SHA512a7c98856e44a99ce4f047035083f9a8f4fe68ea501178b0826b3a239a1869dc61909e57657ee47fc358590de2276e70d626efec1e17badf3517f2ad8f7d4720a
-
Filesize
948KB
MD5d5444caa16a3ad20ab73e7062f720160
SHA18b05f1f7a1574e1b2c7338750be383e182afbef1
SHA256a69df0453c2e281545ca6e45bbdda78b270c85d448da84e94e8d0e6f608590cd
SHA51275168271738f29d2f53a9c874d538999e62b352b50855c01f90a055890238fc57ade786feb482073e30b32e1549db8c064fa092d6121e0ca8cc7d335ef08885c
-
Filesize
1.8MB
MD58c86b80518406f14a4952d67185032d6
SHA19269f1fbcf65fefbc88a2e239519c21efe0f6ba5
SHA256895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a
SHA5121bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099
-
Filesize
944KB
MD5af592f4999ffdd841115cf24d35220c2
SHA1de8abf631fcf7abbbeafd435c1b4e348b3ae4afa
SHA2566c654268a1597c4ee9ba49c12baadd59a4c29f8216352c0589b91bf9e5284aa3
SHA51237bb632a1d1a171a48859838d0bafe6d6b89aca71a41a9b859c5586a9504ae23fed695f96ec0a0ccdc7821c5e0d184aab02e0a8dec8b823a07ee643ba615a956
-
Filesize
232KB
MD5ad53ead5379985081b7c3f1f357e545a
SHA16f5aa32c1d15fbf073558fadafd046d97b60184e
SHA2564f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f
SHA512433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0
-
Filesize
1KB
MD5ee02243d11b868211952b2872d5e77dd
SHA1af6f1aac14f5c48cbdb128948ea1ee540920fdfd
SHA2565c6c8cd51aad41d81ba9384f90f95f6aab74698dec0bec749ffc0abfe091c766
SHA512c1630889764af7197aa855fadd3340569e64f513aa6b2407c119df299709646242a086bb33a5061e889fca9b2837718a277dc850e6b79f4cfb7c5437d59658f3