Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
4aa9b7b5b577b6596e284ef74944718f3e790cbdda9f8fc30c065a545dab628a.dll
Resource
win7-20240903-en
General
-
Target
4aa9b7b5b577b6596e284ef74944718f3e790cbdda9f8fc30c065a545dab628a.dll
-
Size
1.1MB
-
MD5
47256612c3c8c8f506e0755af28551e8
-
SHA1
c72c90635b24feadcd786fef8cfe756eaa14b4cb
-
SHA256
4aa9b7b5b577b6596e284ef74944718f3e790cbdda9f8fc30c065a545dab628a
-
SHA512
c84b91c039127bf34c2bf3996fe5c044dbd34ca248f8117966d4a43582f4e87578b471675278a6f46ba20fe58856144c8498d435e4df15075a087a81815e0075
-
SSDEEP
12288:IkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:IkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3440-3-0x0000000003140000-0x0000000003141000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/3672-1-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3440-23-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3440-34-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3672-37-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/944-44-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/944-49-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3436-64-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/2992-75-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral2/memory/2992-79-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesProtection.exeGamePanel.exeshrpubw.exepid process 944 SystemPropertiesProtection.exe 3436 GamePanel.exe 2992 shrpubw.exe -
Loads dropped DLL 3 IoCs
Processes:
SystemPropertiesProtection.exeGamePanel.exeshrpubw.exepid process 944 SystemPropertiesProtection.exe 3436 GamePanel.exe 2992 shrpubw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Labelis = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\Keys\\5ixEFWimW\\GamePanel.exe" -
Processes:
SystemPropertiesProtection.exeGamePanel.exeshrpubw.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesProtection.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 Token: SeShutdownPrivilege 3440 Token: SeCreatePagefilePrivilege 3440 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3440 3440 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3440 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3440 wrote to memory of 4144 3440 SystemPropertiesProtection.exe PID 3440 wrote to memory of 4144 3440 SystemPropertiesProtection.exe PID 3440 wrote to memory of 944 3440 SystemPropertiesProtection.exe PID 3440 wrote to memory of 944 3440 SystemPropertiesProtection.exe PID 3440 wrote to memory of 1600 3440 GamePanel.exe PID 3440 wrote to memory of 1600 3440 GamePanel.exe PID 3440 wrote to memory of 3436 3440 GamePanel.exe PID 3440 wrote to memory of 3436 3440 GamePanel.exe PID 3440 wrote to memory of 3988 3440 shrpubw.exe PID 3440 wrote to memory of 3988 3440 shrpubw.exe PID 3440 wrote to memory of 2992 3440 shrpubw.exe PID 3440 wrote to memory of 2992 3440 shrpubw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4aa9b7b5b577b6596e284ef74944718f3e790cbdda9f8fc30c065a545dab628a.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
C:\Windows\system32\SystemPropertiesProtection.exeC:\Windows\system32\SystemPropertiesProtection.exe1⤵PID:4144
-
C:\Users\Admin\AppData\Local\muqlYP\SystemPropertiesProtection.exeC:\Users\Admin\AppData\Local\muqlYP\SystemPropertiesProtection.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:944
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵PID:1600
-
C:\Users\Admin\AppData\Local\0woGdy6ZX\GamePanel.exeC:\Users\Admin\AppData\Local\0woGdy6ZX\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3436
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵PID:3988
-
C:\Users\Admin\AppData\Local\u1c1x\shrpubw.exeC:\Users\Admin\AppData\Local\u1c1x\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
Filesize
1.1MB
MD54e9cb1593a73cb0bec22e9f115eb7de4
SHA1209b585707d3b686220f084632a093500aa44f6b
SHA256f2d32ff2ced8807ac9a49d88086caafb9f39b091c1acd58d18131b18b8ece3b8
SHA512e38f52eb3d21bd38c576516c5540c8c9c2db46815cd4d159d4bc050cb44fae9cb88604683b738f20517621edfb6d0d6df8f14cdb0f2a416515ccc57783d95586
-
Filesize
1.1MB
MD5836615462c69b906d11586905fe92c7a
SHA1a2fbe85cc6c739b8663c02d1d9815be73d4f46c6
SHA256a66aa809aaef13a3c26925b0a1ae9c9abb88773574125ab3ed86c64be472903f
SHA512bf1023601f96df94f7686f7095c83f5e6a1a5cfab6f5be19d6f7955d842e0684571a7bc1eed8ab9aa85b6fad8cacce31476c5eee9424ac33d23af115b3cc0346
-
Filesize
82KB
MD526640d2d4fa912fc9a354ef6cfe500ff
SHA1a343fd82659ce2d8de3beb587088867cf2ab8857
SHA256a8ddf1b17b0cbc96a7eaedb0003aa7b1631da09ebfe85b387f8f630222511b37
SHA51226162a3d9d4a8e3290dbcf6fe387b5c48ab1d9552aa02a38954649d877f408cb282e57580f81e15128e3a41da0eb58328d1d6253e1b57232f9a8cecdd99991dc
-
Filesize
1.1MB
MD5c5fce8279cd9f71ec6f2cd6e7364649e
SHA190f83345da7d2daaecb5e3a8f38ac9627af4e023
SHA256c8d55c3ae19c06d317d08bbcd8e124c0613f89dd34a19a12b787c40c4e77afcb
SHA512482b98ef793ef59946a7baca50d63268ee49fb0db42a4da4f1e76accc477ade35d5dab3f6f4d6709bbbf413acc607aa8a9aed8fd00049923217a6cd103c10b94
-
Filesize
59KB
MD59910d5c62428ec5f92b04abf9428eec9
SHA105f27d7515e8ae1fa3bc974ec65b864ec4c9ac8b
SHA2566b84e6e55d8572d7edf0b6243d00abb651fcb0cddddac8461de5f9bb80035a2e
SHA51201be043f7ff879a683e53962eec58456ba200d6787ea66581bb62669ae65d5e58a5577cdf23441165f7a535fce1dec933e3ad2465c72172b4a1488b24ce722cb
-
Filesize
1KB
MD5bc47529407c911baf374ea49d5783476
SHA18b13e9cc719948fab8e2e0668ee37f722569f346
SHA2565de3e8061bf1adaa4b848c273af7cbdb4e2a063982cd0eeb0d0f1eadd97b0fb6
SHA5122edba9bd89f26003d9f10907f0c477e11beaed1a8a6f2ebfefb0921782fc6c43773007715dfcb987b0fe9430569c11eee37f0fb5c33898e98febd60c807a2ef3