Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
e1d0c9ec091309e43c83ca07653cf608a2b60ea3f195f6692a13f1f70faf4459.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e1d0c9ec091309e43c83ca07653cf608a2b60ea3f195f6692a13f1f70faf4459.dll
Resource
win10v2004-20241007-en
General
-
Target
e1d0c9ec091309e43c83ca07653cf608a2b60ea3f195f6692a13f1f70faf4459.dll
-
Size
1.5MB
-
MD5
18fe877565482627cb5fe6fe8b5f5440
-
SHA1
8e7e8926e6e88075fdf115b72bf63e47ac93c258
-
SHA256
e1d0c9ec091309e43c83ca07653cf608a2b60ea3f195f6692a13f1f70faf4459
-
SHA512
11688819210d0eaa084f11d7f393d922cac9b86f803259ebd8d77db4ddaaa5e37b5deeb8324f2ac995241a17b1aaab51d4b287ae6f79885f71a6a49c5ec79e1d
-
SSDEEP
12288:+XBQ3fMQyWV0rbDxyBWZh2TvtgHoiemIKI1ydX7wmqzq3wkgJLnq:8B/Qn0rbD8UZUDtgIiemI51Mwtewkm7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3556-3-0x0000000003140000-0x0000000003141000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/2276-2-0x00007FF9DA0F0000-0x00007FF9DA26D000-memory.dmp dridex_payload behavioral2/memory/3556-21-0x0000000140000000-0x000000014017D000-memory.dmp dridex_payload behavioral2/memory/3556-40-0x0000000140000000-0x000000014017D000-memory.dmp dridex_payload behavioral2/memory/3556-29-0x0000000140000000-0x000000014017D000-memory.dmp dridex_payload behavioral2/memory/2276-43-0x00007FF9DA0F0000-0x00007FF9DA26D000-memory.dmp dridex_payload behavioral2/memory/1188-50-0x00007FF9DA2C0000-0x00007FF9DA43E000-memory.dmp dridex_payload behavioral2/memory/1188-55-0x00007FF9DA2C0000-0x00007FF9DA43E000-memory.dmp dridex_payload behavioral2/memory/4472-66-0x00007FF9DA470000-0x00007FF9DA5EF000-memory.dmp dridex_payload behavioral2/memory/4472-71-0x00007FF9DA470000-0x00007FF9DA5EF000-memory.dmp dridex_payload behavioral2/memory/3196-82-0x00007FF9DA470000-0x00007FF9DA5EE000-memory.dmp dridex_payload behavioral2/memory/3196-86-0x00007FF9DA470000-0x00007FF9DA5EE000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1188 dccw.exe 4472 RdpSa.exe 3196 AtBroker.exe -
Loads dropped DLL 3 IoCs
pid Process 1188 dccw.exe 4472 RdpSa.exe 3196 AtBroker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Husvxt = "C:\\Users\\Admin\\AppData\\Roaming\\Sun\\Java\\8xBR\\RdpSa.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AtBroker.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found 3556 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3556 Process not Found 3556 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3556 wrote to memory of 1900 3556 Process not Found 86 PID 3556 wrote to memory of 1900 3556 Process not Found 86 PID 3556 wrote to memory of 1188 3556 Process not Found 87 PID 3556 wrote to memory of 1188 3556 Process not Found 87 PID 3556 wrote to memory of 3712 3556 Process not Found 88 PID 3556 wrote to memory of 3712 3556 Process not Found 88 PID 3556 wrote to memory of 4472 3556 Process not Found 89 PID 3556 wrote to memory of 4472 3556 Process not Found 89 PID 3556 wrote to memory of 4716 3556 Process not Found 90 PID 3556 wrote to memory of 4716 3556 Process not Found 90 PID 3556 wrote to memory of 3196 3556 Process not Found 91 PID 3556 wrote to memory of 3196 3556 Process not Found 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1d0c9ec091309e43c83ca07653cf608a2b60ea3f195f6692a13f1f70faf4459.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵PID:1900
-
C:\Users\Admin\AppData\Local\IPJ\dccw.exeC:\Users\Admin\AppData\Local\IPJ\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1188
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe1⤵PID:3712
-
C:\Users\Admin\AppData\Local\r2h\RdpSa.exeC:\Users\Admin\AppData\Local\r2h\RdpSa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4472
-
C:\Windows\system32\AtBroker.exeC:\Windows\system32\AtBroker.exe1⤵PID:4716
-
C:\Users\Admin\AppData\Local\Xfel\AtBroker.exeC:\Users\Admin\AppData\Local\Xfel\AtBroker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5cb9374911bf5237179785c739a322c0f
SHA13f4d3dd3d58c9f19dfbb414ded16969ebd9f74b9
SHA256f7f3300b78148a34f6a35796c777a832b638b6d3193e11f4a37f45d4c6dfa845
SHA5129d47521538148b1823c0a17baa86ddf932f06f46d5d8b63fa87b2cc220fb98ce3f933e32d771222937bb8e41c88030839d489d1cd78b062bffeb2980dc6864be
-
Filesize
1.5MB
MD5e84c178e9104d62f5b1b92a7659f1145
SHA1cb5a0c3ff09d8452d718e4a1f745ccdd4c33c46c
SHA25660b8405827fca356124afd6c74a5e8c7bbfe201bc3939d1b8e326e97e41ee555
SHA51290c8d2f4d31b94aadc9e3d70aee89b83c4af482a2cce08eb8123daebceb98324012e2d2ecd6a28cde90a762065a0e75951cba60093425127495ca042e50b2232
-
Filesize
90KB
MD530076e434a015bdf4c136e09351882cc
SHA1584c958a35e23083a0861421357405afd26d9a0c
SHA256ae7b1e298a6e38f0a3428151bfc5565ede50a8d98dafaa147b13cf89c61f2ddd
SHA512675e310c2455acf9220735f34fa527afe87dac691e89cc0edc3c4659147e9fd223f96b7a3beea532047aa0ebc58880a7010343019a50aa73ce69a038e3592024
-
Filesize
1.5MB
MD54650e5e3953485ed692a2b4287f8b3b9
SHA18f4578592d21927fadbf52387e12dfcd688508a7
SHA2565c919c5ec412d2bf59bb59598c8098cf217bac7f6331fc406f5fffc8ba52d3e2
SHA5125a78cd7a3461d6d69cf1d27c295434a9a1a668d8f6a63342bf4a0835f7a2ac4eb7ca4926dd64d89b0be5ccf64add63e409c9267832d1206830527566e402b9eb
-
Filesize
56KB
MD55992f5b5d0b296b83877da15b54dd1b4
SHA10d87be8d4b7aeada4b55d1d05c0539df892f8f82
SHA25632f60eabe54c4d0cd0f0ec29f48f55ca1ad097bf35097247b186fd70426f847c
SHA5124f6da913af530301da1d0638aa2635ada446ebee6e27b5059db5c2b7fe439162ac3b1a595ecf4163a093890df9ac94d9085a53d8c991e48703f9d2691326e7e6
-
Filesize
1.5MB
MD5ac8c6ca9e2991bfdd61778e7ec078ff3
SHA197105a7c299f51ac8bb044fa72bc74945fac6f0f
SHA256098f661a26579880adc576af41ad629ab6ce8fd8dcfc2ced18b3a8aec8e8bf54
SHA512395c469e01fa933e98b05399c407a32cdf09d4a58aaf9a5800083a40f5948ba09574e3d18b5b65cbe0b4eede57f593ad8c90a8c4757c02a823552068c1a789e8
-
Filesize
1KB
MD54238838ce4bb695b236b39b60f1149e0
SHA1968e9addae8c368d25e8cdbed5e9fc9ad9c26fa4
SHA256bc028467f6c77ae925996fd63c0fe6047cdcd5ba0c6398521390bb99f610b668
SHA512ce13331fc7dbf6ff01d785d3baf27fdf68f3f3a46389f279f6a935797fb620ce2730a0486e1afa7dc093606af2c12d52c94f1f428ff70c2a4e40330a968e9122