Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
14428c7813afa82b51e9e7c3414150907f27d1a86772d8c85873078c06e87eab.dll
Resource
win7-20241010-en
General
-
Target
14428c7813afa82b51e9e7c3414150907f27d1a86772d8c85873078c06e87eab.dll
-
Size
1.1MB
-
MD5
3b20b57c1a38d810a1ad07271a1a2fea
-
SHA1
e2ea64f5665cf9d79b69e8156964617a3c2d0ded
-
SHA256
14428c7813afa82b51e9e7c3414150907f27d1a86772d8c85873078c06e87eab
-
SHA512
ed9fde35767cf9f76d7d37fe1b3540032013fae2f79d3de6b288e446053630a0609372d9e517e03444472279910169286b8339bd63ba9f25ace6ddc88f23a6b2
-
SSDEEP
12288:MkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:MkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3420-3-0x0000000003440000-0x0000000003441000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/2648-1-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3420-23-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3420-34-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/2648-37-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/4400-45-0x000001C296ED0000-0x000001C296FED000-memory.dmp dridex_payload behavioral2/memory/4400-50-0x000001C296ED0000-0x000001C296FED000-memory.dmp dridex_payload behavioral2/memory/3320-63-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3320-66-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3100-81-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
PresentationHost.exeMDMAppInstaller.exeRecoveryDrive.exepid process 4400 PresentationHost.exe 3320 MDMAppInstaller.exe 3100 RecoveryDrive.exe -
Loads dropped DLL 4 IoCs
Processes:
PresentationHost.exeMDMAppInstaller.exeRecoveryDrive.exepid process 4400 PresentationHost.exe 4400 PresentationHost.exe 3320 MDMAppInstaller.exe 3100 RecoveryDrive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzvdnevrdk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\OneNote\\Kp4W8rPqrpN\\MDMAppInstaller.exe" -
Processes:
rundll32.exePresentationHost.exeMDMAppInstaller.exeRecoveryDrive.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MDMAppInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RecoveryDrive.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3420 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3420 wrote to memory of 4912 3420 PresentationHost.exe PID 3420 wrote to memory of 4912 3420 PresentationHost.exe PID 3420 wrote to memory of 4400 3420 PresentationHost.exe PID 3420 wrote to memory of 4400 3420 PresentationHost.exe PID 3420 wrote to memory of 412 3420 MDMAppInstaller.exe PID 3420 wrote to memory of 412 3420 MDMAppInstaller.exe PID 3420 wrote to memory of 3320 3420 MDMAppInstaller.exe PID 3420 wrote to memory of 3320 3420 MDMAppInstaller.exe PID 3420 wrote to memory of 1540 3420 RecoveryDrive.exe PID 3420 wrote to memory of 1540 3420 RecoveryDrive.exe PID 3420 wrote to memory of 3100 3420 RecoveryDrive.exe PID 3420 wrote to memory of 3100 3420 RecoveryDrive.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14428c7813afa82b51e9e7c3414150907f27d1a86772d8c85873078c06e87eab.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
C:\Windows\system32\PresentationHost.exeC:\Windows\system32\PresentationHost.exe1⤵PID:4912
-
C:\Users\Admin\AppData\Local\Qd4z7\PresentationHost.exeC:\Users\Admin\AppData\Local\Qd4z7\PresentationHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4400
-
C:\Windows\system32\MDMAppInstaller.exeC:\Windows\system32\MDMAppInstaller.exe1⤵PID:412
-
C:\Users\Admin\AppData\Local\GLm3kG\MDMAppInstaller.exeC:\Users\Admin\AppData\Local\GLm3kG\MDMAppInstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3320
-
C:\Windows\system32\RecoveryDrive.exeC:\Windows\system32\RecoveryDrive.exe1⤵PID:1540
-
C:\Users\Admin\AppData\Local\RE1S\RecoveryDrive.exeC:\Users\Admin\AppData\Local\RE1S\RecoveryDrive.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD530e978cc6830b04f1e7ed285cccaa746
SHA1e915147c17e113c676c635e2102bbff90fb7aa52
SHA256dc821931f63117962e2266acd3266e86bf8116d4a14b3adbebfade1d40b84766
SHA512331923fa479f71c4c80b0e86ea238628666f95b6cf61cf4d741ae4a27ea2b8c636864dfac543d14599b4873f3b2ab397d07c4e4c17aca3f3b4e5871e24e50214
-
Filesize
1.1MB
MD59a781dfc577bee319f76ad0ab12ba3b8
SHA1ac0189eb549b7a5ff2733b619411690af7d551d1
SHA256f561364d0d015842e1a2a00ceef2354a58598c60e6ac6aec42563247768b3d16
SHA5129bcd375d2c2ce43b8dea8ece0375e30c57357b627859c4990f78ee7a76a08872c2ec8fb4bf546c48e7f4b107493d72ebfcb5c3e423893dca53e090245184a33b
-
Filesize
276KB
MD5ef27d65b92d89e8175e6751a57ed9d93
SHA17279b58e711b459434f047e9098f9131391c3778
SHA25617d6dcfaced6873a4ac0361ff14f48313f270ac9c465e9f02b5c12b5a5274c48
SHA51240f46c3a131bb0388b8a3f7aee422936f6e2aa8d2cda547c43c4e7979c163d06c5aa20033a5156d3eeee5d455eeb929cbce89bcc8bb1766cbb65d7f03dd23e2e
-
Filesize
1.1MB
MD5d202b4f3d8afd7768940c222c56bf9ed
SHA1ed42160a34ad16a82b23e3f7a2ad1662eb25aa19
SHA256c9e2d09c43992c0d41fa278b3723c4809104b19a67f609a1f825672ae0ec1774
SHA5120af811f0c751c04f3fbc8af684471f9156d3490f23ca20b8f4a254bf64e429d8e9a54c0b86a492892643f7d404991700aaef842fed8504f54766b84c898bbb2e
-
Filesize
911KB
MD5b9b3dc6f2eb89e41ff27400952602c74
SHA124ae07e0db3ace0809d08bbd039db3a9d533e81b
SHA256630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4
SHA5127906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe
-
Filesize
1.1MB
MD515f4ec5c74c6f7646bbc1a00d1c3ecaa
SHA157a30636accd5378b3c3298a1aff4188e9ca715c
SHA256693dfe616c0be251cc9c2324ce39ae405393d06f47593fd4316f012848f8b7b1
SHA51282d3f285162523463e0e85e81cc69acb9a5685455de9f605b533dfd53de9bdde697645e50bec3fae3f9ef018e99dd50366f6130539ae928a414984b2dfd9e467
-
Filesize
1KB
MD56ce5de7fe6e8ece011423852047de9f9
SHA1072609ad6585cf1482d8153ab0076a93e3ec9f09
SHA256be475b319c860c40c4f8a8141901b622375b238538343453f753307ae057a9d6
SHA512d6d4919e20445ee6322deeaf505924bd1b567151f39aa7964ceb043aeee99bb63940380abd298d890f44961bf5719c75888b1b5f140c62c53f481b801eed80f8