Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 07:25
Static task
static1
Behavioral task
behavioral1
Sample
92b4e93c7a975815e2adc790967b59c283aec15614dd14ef1cb1f3b9de5575d1.dll
Resource
win7-20240903-en
General
-
Target
92b4e93c7a975815e2adc790967b59c283aec15614dd14ef1cb1f3b9de5575d1.dll
-
Size
1.1MB
-
MD5
15815247242b43059aebf26e60e3256b
-
SHA1
35b9b6fc8eac16bf80665da6a3fbd4aca140c494
-
SHA256
92b4e93c7a975815e2adc790967b59c283aec15614dd14ef1cb1f3b9de5575d1
-
SHA512
d937b72eed31749bada0d69dbefcd27c528d05254369f174ce928f31b82dfb6fa5d54905d3e72d0b8825346423cba71d631de1903cbd7ca9f83e12c822fa2ed7
-
SSDEEP
12288:5kMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64CR:5kMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-4-0x0000000002A90000-0x0000000002A91000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2976-0-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/1204-24-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/1204-36-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/1204-35-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2976-44-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2748-53-0x0000000140000000-0x0000000140152000-memory.dmp dridex_payload behavioral1/memory/2748-58-0x0000000140000000-0x0000000140152000-memory.dmp dridex_payload behavioral1/memory/2580-71-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral1/memory/2580-75-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral1/memory/1152-91-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
Utilman.exep2phost.exerdpshell.exepid process 2748 Utilman.exe 2580 p2phost.exe 1152 rdpshell.exe -
Loads dropped DLL 7 IoCs
Processes:
Utilman.exep2phost.exerdpshell.exepid process 1204 2748 Utilman.exe 1204 2580 p2phost.exe 1204 1152 rdpshell.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Auwqk = "C:\\Users\\Admin\\AppData\\Roaming\\MEDIAC~1\\KRo\\p2phost.exe" -
Processes:
Utilman.exep2phost.exerdpshell.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA p2phost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2976 rundll32.exe 2976 rundll32.exe 2976 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 588 1204 Utilman.exe PID 1204 wrote to memory of 588 1204 Utilman.exe PID 1204 wrote to memory of 588 1204 Utilman.exe PID 1204 wrote to memory of 2748 1204 Utilman.exe PID 1204 wrote to memory of 2748 1204 Utilman.exe PID 1204 wrote to memory of 2748 1204 Utilman.exe PID 1204 wrote to memory of 2552 1204 p2phost.exe PID 1204 wrote to memory of 2552 1204 p2phost.exe PID 1204 wrote to memory of 2552 1204 p2phost.exe PID 1204 wrote to memory of 2580 1204 p2phost.exe PID 1204 wrote to memory of 2580 1204 p2phost.exe PID 1204 wrote to memory of 2580 1204 p2phost.exe PID 1204 wrote to memory of 1696 1204 rdpshell.exe PID 1204 wrote to memory of 1696 1204 rdpshell.exe PID 1204 wrote to memory of 1696 1204 rdpshell.exe PID 1204 wrote to memory of 1152 1204 rdpshell.exe PID 1204 wrote to memory of 1152 1204 rdpshell.exe PID 1204 wrote to memory of 1152 1204 rdpshell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92b4e93c7a975815e2adc790967b59c283aec15614dd14ef1cb1f3b9de5575d1.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵PID:588
-
C:\Users\Admin\AppData\Local\BXVuu6aQ0\Utilman.exeC:\Users\Admin\AppData\Local\BXVuu6aQ0\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2748
-
C:\Windows\system32\p2phost.exeC:\Windows\system32\p2phost.exe1⤵PID:2552
-
C:\Users\Admin\AppData\Local\9PB\p2phost.exeC:\Users\Admin\AppData\Local\9PB\p2phost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2580
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:1696
-
C:\Users\Admin\AppData\Local\pVP\rdpshell.exeC:\Users\Admin\AppData\Local\pVP\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD510f65822dd82271415b3ec3018cb409c
SHA198b76fc29dd32206934e51f0d3d641a958ac2db3
SHA256f9a6898a84675d9d89fb90c73dbe49103aea849785c8459c7dfd545896c5d85c
SHA5120c2398632af02a8dbffb9584b55885b37deb2fbf58653e63119b85517911d88c4db046654849a1dffe745b67138342bfb1b08f59f4b06ab1daba4c515cf92a99
-
Filesize
1.3MB
MD51e7c39801920ecce84266de5dfeafbaa
SHA1d9ebbdd3dac88a495e3591569943f3cfabe28476
SHA256ab83b9fd8ab36f61519e0db84c93224a63a8470666ded357ee2175a12b20fa70
SHA5121b786b569cefdc9e418bbbc8e114878b55d5fa59ccdaddb70f2c068eec378d49895b0092d55d393b4d6d792c1c00913ce3ec27f9d01b4270500343184d4063ba
-
Filesize
1.1MB
MD54a763113d7c0445c76ea01e519f102e2
SHA13b322dcd7cd943bb8ea2b2383a409bab4b281754
SHA256924a5355233355fddb5fa1af25862ebfede036c18844e5b195395acdaf643654
SHA512b00b21b1d650d685d413c5db128d926a8f8c0c46a27e7ba48f31813ea1cecd454af55cf591c86b652b606dd0a5c583804006bc6eda6f075e4d6bd7cf2be54663
-
Filesize
950B
MD5f5753d1019eb28305ed347d4a9bba858
SHA13b0d78428b72efd990de090adc498814ae6aaa10
SHA256aa4dc87bba47bfee39e6187eceb2edc6b242a9a58f7543c2150e5d6d0b1842f1
SHA512ca9529ac86e06026d3754ed4b50616cf4d7c0d0e921e4ebc773b77e339c0c5987e74ce7c9ad71006ec193738dfbe8ce0917cf19257efae799eef750d8f95dc88
-
Filesize
172KB
MD50dbd420477352b278dfdc24f4672b79c
SHA1df446f25be33ac60371557717073249a64e04bb2
SHA2561baba169de6c8f3b3c33cea96314c67b709a171bdc8ea9c250a0d016db767345
SHA51284014b2dcc00f9fa1a337089ad4d4abcaa9e3155171978ec07bc155ddaebebfabb529d8de3578e564b3aae59545f52d71af173ebb50d2af252f219ac60b453d1
-
Filesize
1.3MB
MD532c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
Filesize
292KB
MD5a62dfcea3a58ba8fcf32f831f018fe3f
SHA175f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b
SHA256f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e
SHA5129a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603