Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
14428c7813afa82b51e9e7c3414150907f27d1a86772d8c85873078c06e87eab.dll
Resource
win7-20241010-en
General
-
Target
14428c7813afa82b51e9e7c3414150907f27d1a86772d8c85873078c06e87eab.dll
-
Size
1.1MB
-
MD5
3b20b57c1a38d810a1ad07271a1a2fea
-
SHA1
e2ea64f5665cf9d79b69e8156964617a3c2d0ded
-
SHA256
14428c7813afa82b51e9e7c3414150907f27d1a86772d8c85873078c06e87eab
-
SHA512
ed9fde35767cf9f76d7d37fe1b3540032013fae2f79d3de6b288e446053630a0609372d9e517e03444472279910169286b8339bd63ba9f25ace6ddc88f23a6b2
-
SSDEEP
12288:MkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:MkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1368-4-0x0000000002770000-0x0000000002771000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2332-0-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1368-23-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/2332-34-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1368-36-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1368-35-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/2732-52-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2732-57-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2188-69-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2188-74-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/584-90-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2732 SystemPropertiesComputerName.exe 2188 rrinstaller.exe 584 msconfig.exe -
Loads dropped DLL 7 IoCs
pid Process 1368 Process not Found 2732 SystemPropertiesComputerName.exe 1368 Process not Found 2188 rrinstaller.exe 1368 Process not Found 584 msconfig.exe 1368 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kgvptlq = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Excel\\JEbT\\rrinstaller.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 rundll32.exe 2332 rundll32.exe 2332 rundll32.exe 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2620 1368 Process not Found 31 PID 1368 wrote to memory of 2620 1368 Process not Found 31 PID 1368 wrote to memory of 2620 1368 Process not Found 31 PID 1368 wrote to memory of 2732 1368 Process not Found 32 PID 1368 wrote to memory of 2732 1368 Process not Found 32 PID 1368 wrote to memory of 2732 1368 Process not Found 32 PID 1368 wrote to memory of 1456 1368 Process not Found 33 PID 1368 wrote to memory of 1456 1368 Process not Found 33 PID 1368 wrote to memory of 1456 1368 Process not Found 33 PID 1368 wrote to memory of 2188 1368 Process not Found 34 PID 1368 wrote to memory of 2188 1368 Process not Found 34 PID 1368 wrote to memory of 2188 1368 Process not Found 34 PID 1368 wrote to memory of 2272 1368 Process not Found 35 PID 1368 wrote to memory of 2272 1368 Process not Found 35 PID 1368 wrote to memory of 2272 1368 Process not Found 35 PID 1368 wrote to memory of 584 1368 Process not Found 36 PID 1368 wrote to memory of 584 1368 Process not Found 36 PID 1368 wrote to memory of 584 1368 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14428c7813afa82b51e9e7c3414150907f27d1a86772d8c85873078c06e87eab.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵PID:2620
-
C:\Users\Admin\AppData\Local\TY7e5bw\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\TY7e5bw\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2732
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:1456
-
C:\Users\Admin\AppData\Local\QsU4\rrinstaller.exeC:\Users\Admin\AppData\Local\QsU4\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2188
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:2272
-
C:\Users\Admin\AppData\Local\1ydOO9ZD\msconfig.exeC:\Users\Admin\AppData\Local\1ydOO9ZD\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD57e4fefa65eea97055527866dfb1f1b81
SHA11c266150513ff7e4fe301716cff23eaa14c97e4e
SHA256f0e2500b0271489539994a879fe6a630cef03958f2f09994a5e11f4858a288ad
SHA5126ddf7a84878cb657c8bba2aa44f83553cde86a592a617da190c59f036705febff586d5b1376d42a00cf2901a7be841744a242342fcd09ed584111f79e72477bc
-
Filesize
1.1MB
MD5d9ecab7d3e7af7dbacd1216ff50c822f
SHA1206ea932cdda5689055fce8dc87dbe38f0944475
SHA2569082a270e7dc10915db7f5c1107f56c3880524b5a32474941d421c33361920f3
SHA512e4351690a14ef267797a216561444b7d0453d548781e89d81985c2b11048e56670105a02bcc915b85e42900bebb02a5040e1d15ceebeb93764b496c32415697e
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
Filesize
1.1MB
MD526fb6fa764bcd1985f7ea05e885ba443
SHA1d2d6484c2ca8b34fcb01ef4c21af1c2c28ce7590
SHA2564370bc1c81b3e2df2c89822bbfdb7804676cf8f3fae3f86e0d2cd053be032e28
SHA51266c2df214388728621c46556ae1e1f2c8f93652f55b1905f6554653cfa7099c12e265370fef521fbaea7923eb8443e801e39dea0253eb1d762bb274f3de8b30a
-
Filesize
1KB
MD5686fd5479a7804074091983c198f0589
SHA1a4d3792f89c8225bc72bc6add33bbb96604e818a
SHA2561708c7aabef9ed920b5df2f4e1f8fbd1f0b775a1610d33b1acc8a8e17d023bfa
SHA5122e06f8e1b8c8ee04d8808a512a3fe2e48d01d9ab1c2dd4472a2a3354077d8ff729f22aed8adf3a22778d4a161c286d5d19e9667e71ea8d435091ec1eebc70620
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283
-
Filesize
80KB
MD5bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026