Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
e661ee88d2b42533974dbaf54bd50d687c83bc35e2110e3aac9dbf40358d5cf8.dll
Resource
win7-20240903-en
General
-
Target
e661ee88d2b42533974dbaf54bd50d687c83bc35e2110e3aac9dbf40358d5cf8.dll
-
Size
1.3MB
-
MD5
c1149d0d1cd46a9b3eb35371b41c4a63
-
SHA1
9001ee8245fd45cfdf537afc41cdf6338fe66928
-
SHA256
e661ee88d2b42533974dbaf54bd50d687c83bc35e2110e3aac9dbf40358d5cf8
-
SHA512
448fb9b0e378ce4c33fc691343e6b0e1aba4f12b17f0e960d3a575ec9ac3a9d59e9972072d222c3f615433fb58cadfad85f7433a6abf43042fd53e36f18f6dba
-
SSDEEP
12288:BXBQ3fMQyWV0rbDxyBWZh2TvtgHoiemIKI1ydX7wmqzq3wkgJ:9B/Qn0rbD8UZUDtgIiemI51Mwtewkm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-4-0x0000000002540000-0x0000000002541000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2684-0-0x000007FEF5D20000-0x000007FEF5E6A000-memory.dmp dridex_payload behavioral1/memory/1204-21-0x0000000140000000-0x000000014014A000-memory.dmp dridex_payload behavioral1/memory/1204-29-0x0000000140000000-0x000000014014A000-memory.dmp dridex_payload behavioral1/memory/1204-42-0x0000000140000000-0x000000014014A000-memory.dmp dridex_payload behavioral1/memory/1204-41-0x0000000140000000-0x000000014014A000-memory.dmp dridex_payload behavioral1/memory/2684-49-0x000007FEF5D20000-0x000007FEF5E6A000-memory.dmp dridex_payload behavioral1/memory/2604-60-0x000007FEF5D20000-0x000007FEF5E6B000-memory.dmp dridex_payload behavioral1/memory/2604-63-0x000007FEF5D20000-0x000007FEF5E6B000-memory.dmp dridex_payload behavioral1/memory/1560-76-0x000007FEF5BF0000-0x000007FEF5D3B000-memory.dmp dridex_payload behavioral1/memory/1560-80-0x000007FEF5BF0000-0x000007FEF5D3B000-memory.dmp dridex_payload behavioral1/memory/2920-96-0x000007FEF5BF0000-0x000007FEF5D3B000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
mstsc.exeSystemPropertiesRemote.exeComputerDefaults.exepid process 2604 mstsc.exe 1560 SystemPropertiesRemote.exe 2920 ComputerDefaults.exe -
Loads dropped DLL 7 IoCs
Processes:
mstsc.exeSystemPropertiesRemote.exeComputerDefaults.exepid process 1204 2604 mstsc.exe 1204 1560 SystemPropertiesRemote.exe 1204 2920 ComputerDefaults.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zoekctxdbskyzr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\H9vd\\SYSTEM~1.EXE" -
Processes:
rundll32.exemstsc.exeSystemPropertiesRemote.exeComputerDefaults.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstsc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ComputerDefaults.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2712 1204 mstsc.exe PID 1204 wrote to memory of 2712 1204 mstsc.exe PID 1204 wrote to memory of 2712 1204 mstsc.exe PID 1204 wrote to memory of 2604 1204 mstsc.exe PID 1204 wrote to memory of 2604 1204 mstsc.exe PID 1204 wrote to memory of 2604 1204 mstsc.exe PID 1204 wrote to memory of 1944 1204 SystemPropertiesRemote.exe PID 1204 wrote to memory of 1944 1204 SystemPropertiesRemote.exe PID 1204 wrote to memory of 1944 1204 SystemPropertiesRemote.exe PID 1204 wrote to memory of 1560 1204 SystemPropertiesRemote.exe PID 1204 wrote to memory of 1560 1204 SystemPropertiesRemote.exe PID 1204 wrote to memory of 1560 1204 SystemPropertiesRemote.exe PID 1204 wrote to memory of 636 1204 ComputerDefaults.exe PID 1204 wrote to memory of 636 1204 ComputerDefaults.exe PID 1204 wrote to memory of 636 1204 ComputerDefaults.exe PID 1204 wrote to memory of 2920 1204 ComputerDefaults.exe PID 1204 wrote to memory of 2920 1204 ComputerDefaults.exe PID 1204 wrote to memory of 2920 1204 ComputerDefaults.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e661ee88d2b42533974dbaf54bd50d687c83bc35e2110e3aac9dbf40358d5cf8.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵PID:2712
-
C:\Users\Admin\AppData\Local\hoyM\mstsc.exeC:\Users\Admin\AppData\Local\hoyM\mstsc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2604
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵PID:1944
-
C:\Users\Admin\AppData\Local\QdoWS\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\QdoWS\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1560
-
C:\Windows\system32\ComputerDefaults.exeC:\Windows\system32\ComputerDefaults.exe1⤵PID:636
-
C:\Users\Admin\AppData\Local\Q8Z\ComputerDefaults.exeC:\Users\Admin\AppData\Local\Q8Z\ComputerDefaults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD599f794487c9663477ac8c1863cc9469d
SHA1c4653b385bc271f61c0bde4346ac2fb063091c38
SHA256b0e2b22cd18112cae83fa8065dd1aca5b7827eae870dca91295040c88f9d51fb
SHA5127eee268da92d88c7724f2f033ed0553d76a194aabbf150f8f5ee972d90e81fb508014314b2caa1c218bfad318b559bac70d959ea2030d55a36ca40372469fc29
-
Filesize
1.3MB
MD569967f6113d02f7a15dc97af85c7c42d
SHA1aff440f2a5d2a0d133c92a7d24509e234f79d89b
SHA256890a379ccd45ad924361d73be60b195d739a92dc289d77462780ffc210f0c50e
SHA5124cd6b0360a76e0146f37f1ec419e11e2198a3d7b4b1fda760b252c2dab0a6be30c77aec385c047d4772e2f9bb2546c5603b8110f1b772ac15f4f5c67e7112071
-
Filesize
80KB
MD5d0d7ac869aa4e179da2cc333f0440d71
SHA1e7b9a58f5bfc1ec321f015641a60978c0c683894
SHA2565762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a
SHA5121808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7
-
Filesize
1.3MB
MD58625dc2c57625e79ef23aae6b4c47064
SHA166541a379b6d36dd5b7e90c9455a70c79762381f
SHA25669d3a53ed039ec0a32c6244235cefa9b6e1ee563d2554323bb38639c61537c52
SHA512751e3f15bc72677bf277083695f6ce91090fcfc6501dacb58fec434ca565749f23f8e9e9c94fddcb235ec2373068e194b01f412ab1439a8fc844ce3dc3111129
-
Filesize
772B
MD520bbc23247a0ad6724b2c42fb5dfd6e4
SHA1b5764b621387475fcd4a765454e9237790c923d5
SHA2568a30e3ba25ffd7e0d85fcac1047820e4bc2ae44703dbd6b4e63aa7e79bf37984
SHA512328bca7c66ce3ef640945b8894702a212cd3fcf9e5130d9b5acd01fca8cebdcc341d8ff87d9f776941251d9ccc9345e43ffbefc80d971d1cc13f0430207114a2
-
Filesize
36KB
MD586bd981f55341273753ac42ea200a81e
SHA114fe410efc9aeb0a905b984ac27719ff0dd10ea7
SHA25640b194be2bad2d3d4d1b69f9aec2853c8b663130810a11607ff72a9e3a06d5b3
SHA51249bb6d4bf7a9356fadde7f6165af6973630827d28b69db10ad477a84d98b08fb82e4daae777166e1ddddb5b5efcdf634e4e9bd34b255dae87462ba32e8bba143
-
Filesize
1.1MB
MD550f739538ef014b2e7ec59431749d838
SHA1b439762b8efe8cfb977e7374c11a7e4d8ed05eb3
SHA25685c510c7fa8d64c70886ea01ec99e7b9064594f021a95b4cf88359421e732be3
SHA51202e231ddc4ac012c597b9db42f8a77fbf35ca8253c030d443a0dd4db3d76a9ee1cced600f12d7bb06305e7a4da4a8fda980faad335adcb12738d80d453cb3cc8