Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
7630a12359a46806fd7136d9900fba44a2221ce67ad7a31007c3857238b6d3cc.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7630a12359a46806fd7136d9900fba44a2221ce67ad7a31007c3857238b6d3cc.dll
Resource
win10v2004-20241007-en
General
-
Target
7630a12359a46806fd7136d9900fba44a2221ce67ad7a31007c3857238b6d3cc.dll
-
Size
1.1MB
-
MD5
a8a0cf7dacc631b659a49928caab4bff
-
SHA1
23806c93a27b6a4e7ba07faa15c90cf94e611309
-
SHA256
7630a12359a46806fd7136d9900fba44a2221ce67ad7a31007c3857238b6d3cc
-
SHA512
935c4f34c18d7672c02843849091321f30cbd98f7b75395f7389f10510b9ab94e251f9c61e5653fd954145ea0da82b307574decb36c67d7de5220aa683f52d1f
-
SSDEEP
12288:GkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:GkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3548-4-0x00000000020C0000-0x00000000020C1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/3888-2-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3548-35-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3548-24-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3888-38-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/4744-48-0x000001E9ABD00000-0x000001E9ABE1E000-memory.dmp dridex_payload behavioral2/memory/4744-52-0x000001E9ABD00000-0x000001E9ABE1E000-memory.dmp dridex_payload behavioral2/memory/2124-63-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/2124-68-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/2260-83-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 4744 ie4uinit.exe 2124 AtBroker.exe 2260 raserver.exe -
Loads dropped DLL 5 IoCs
pid Process 4744 ie4uinit.exe 4744 ie4uinit.exe 4744 ie4uinit.exe 2124 AtBroker.exe 2260 raserver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mmqwm = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CTLs\\ezqBPLEWk5\\AtBroker.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4uinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AtBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3888 rundll32.exe 3888 rundll32.exe 3888 rundll32.exe 3888 rundll32.exe 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found 3548 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3548 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3548 wrote to memory of 4272 3548 Process not Found 86 PID 3548 wrote to memory of 4272 3548 Process not Found 86 PID 3548 wrote to memory of 4744 3548 Process not Found 87 PID 3548 wrote to memory of 4744 3548 Process not Found 87 PID 3548 wrote to memory of 1280 3548 Process not Found 88 PID 3548 wrote to memory of 1280 3548 Process not Found 88 PID 3548 wrote to memory of 2124 3548 Process not Found 89 PID 3548 wrote to memory of 2124 3548 Process not Found 89 PID 3548 wrote to memory of 1636 3548 Process not Found 90 PID 3548 wrote to memory of 1636 3548 Process not Found 90 PID 3548 wrote to memory of 2260 3548 Process not Found 91 PID 3548 wrote to memory of 2260 3548 Process not Found 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7630a12359a46806fd7136d9900fba44a2221ce67ad7a31007c3857238b6d3cc.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵PID:4272
-
C:\Users\Admin\AppData\Local\hv1Falr8j\ie4uinit.exeC:\Users\Admin\AppData\Local\hv1Falr8j\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4744
-
C:\Windows\system32\AtBroker.exeC:\Windows\system32\AtBroker.exe1⤵PID:1280
-
C:\Users\Admin\AppData\Local\cc0T\AtBroker.exeC:\Users\Admin\AppData\Local\cc0T\AtBroker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2124
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:1636
-
C:\Users\Admin\AppData\Local\DNIlQpM\raserver.exeC:\Users\Admin\AppData\Local\DNIlQpM\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5fabc03b9a3adc2abf8b58820d607d56e
SHA16dd97a510b6272e4bfa6f5361340d1ea3688082b
SHA2562abbb336f8bb485313b6fb2f24c8d8c0a89e8048c590e7c6ed12ba46fbad6081
SHA512ed80b321c703e7ade37c65b299d16cbc22c885654b91c63d70fd237349b462cbe7a83b7d9f58c8b06cd9dee3c2d35aecab4f74f35736e72e74dc5dfb1d19040d
-
Filesize
132KB
MD5d1841c6ee4ea45794ced131d4b68b60e
SHA14be6d2116060d7c723ac2d0b5504efe23198ea01
SHA25638732626242988cc5b8f97fe8d3b030d483046ef66ea90d7ea3607f1adc0600d
SHA512d8bad215872c5956c6e8acac1cd3ad19b85f72b224b068fb71cfd1493705bc7d3390853ba923a1aa461140294f8793247df018484a378e4f026c2a12cb3fa5c9
-
Filesize
90KB
MD530076e434a015bdf4c136e09351882cc
SHA1584c958a35e23083a0861421357405afd26d9a0c
SHA256ae7b1e298a6e38f0a3428151bfc5565ede50a8d98dafaa147b13cf89c61f2ddd
SHA512675e310c2455acf9220735f34fa527afe87dac691e89cc0edc3c4659147e9fd223f96b7a3beea532047aa0ebc58880a7010343019a50aa73ce69a038e3592024
-
Filesize
1.1MB
MD535fdbd7c713d49ed0b26da3302319543
SHA1821a13f7ef33136fa16dc0d9e93546da0a0d7e02
SHA256ba4e2440d5b2901281800216e3518d2adb0f96bc3254a85fcb5a5c02dafc3123
SHA512a909cb80b7eb55ed856e4ccecd06b335dd7ca88709203c30cf23a596725335503faa26908976b7c448ab26dfa9d5361277ef99953367fa3638d77ba93c900652
-
Filesize
1.1MB
MD59e809e1e7ba3e3aee614b0bd65e45e6a
SHA1f9197bdd204981f60b676f5103b6533f29406e85
SHA256c9d196a8fe1e18eadcb2c8fc8bd06dd209bfd11a3536fd4a40332a1c95e601ca
SHA51219cd521ea20b587148b48531f518567ed0efa3dbd56829443015d45b198afeb333d34bc64869ccb35b5a6f89eeec779353da14b800a2b23d8cd7951021b50fc6
-
Filesize
262KB
MD5a2f0104edd80ca2c24c24356d5eacc4f
SHA18269b9fd9231f04ed47419bd565c69dc677fab56
SHA2565d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c
SHA512e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390
-
Filesize
1KB
MD52f18439fc83310890660cfffddea2940
SHA17d3d98dc888d5b6316dacba9c18309428af3d5b5
SHA25671e28d489bd1b2f3f78d6c8ab2150f7a3c5f83eb35fd8853252a1c1e680bc15a
SHA5123490227c5d8ead57d4ab73f063440c8790469ac3236f710206bcc2e776b96f28371158f132bfed108e184cc468b574c4afc323c67317a31f012fdcb8a9dc0b8a