Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
67ddb4eca1cdf94729d513e5acbb1d2b61362b9b1824afb8c3682a9b021c9579.dll
Resource
win7-20240708-en
General
-
Target
67ddb4eca1cdf94729d513e5acbb1d2b61362b9b1824afb8c3682a9b021c9579.dll
-
Size
1.1MB
-
MD5
edb00c9b061bf3a926d1b0c3274f556a
-
SHA1
b87a8d763f02967934771530826d716998a7bc8a
-
SHA256
67ddb4eca1cdf94729d513e5acbb1d2b61362b9b1824afb8c3682a9b021c9579
-
SHA512
e0997a744143db3b611519aac784ecec3cab29600f3cd16ec243450333d445698c9b0dcdd1e43fd89bab898d26e65fcf45b3bb6b81d9e13ae4cbf033e15f2a8a
-
SSDEEP
12288:WkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:WkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002DF0000-0x0000000002DF1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2448-0-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1192-24-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1192-35-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1192-36-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2448-44-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2572-53-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2572-57-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2908-73-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/264-85-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral1/memory/264-89-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
tabcal.exemsdt.exetcmsetup.exepid process 2572 tabcal.exe 2908 msdt.exe 264 tcmsetup.exe -
Loads dropped DLL 7 IoCs
Processes:
tabcal.exemsdt.exetcmsetup.exepid process 1192 2572 tabcal.exe 1192 2908 msdt.exe 1192 264 tcmsetup.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wqbazsgxtjodx = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Word\\mGLlk\\msdt.exe" -
Processes:
msdt.exetcmsetup.exerundll32.exetabcal.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2448 rundll32.exe 2448 rundll32.exe 2448 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 2536 1192 tabcal.exe PID 1192 wrote to memory of 2536 1192 tabcal.exe PID 1192 wrote to memory of 2536 1192 tabcal.exe PID 1192 wrote to memory of 2572 1192 tabcal.exe PID 1192 wrote to memory of 2572 1192 tabcal.exe PID 1192 wrote to memory of 2572 1192 tabcal.exe PID 1192 wrote to memory of 1096 1192 msdt.exe PID 1192 wrote to memory of 1096 1192 msdt.exe PID 1192 wrote to memory of 1096 1192 msdt.exe PID 1192 wrote to memory of 2908 1192 msdt.exe PID 1192 wrote to memory of 2908 1192 msdt.exe PID 1192 wrote to memory of 2908 1192 msdt.exe PID 1192 wrote to memory of 1496 1192 tcmsetup.exe PID 1192 wrote to memory of 1496 1192 tcmsetup.exe PID 1192 wrote to memory of 1496 1192 tcmsetup.exe PID 1192 wrote to memory of 264 1192 tcmsetup.exe PID 1192 wrote to memory of 264 1192 tcmsetup.exe PID 1192 wrote to memory of 264 1192 tcmsetup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67ddb4eca1cdf94729d513e5acbb1d2b61362b9b1824afb8c3682a9b021c9579.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:2536
-
C:\Users\Admin\AppData\Local\gpNse8E1u\tabcal.exeC:\Users\Admin\AppData\Local\gpNse8E1u\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2572
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:1096
-
C:\Users\Admin\AppData\Local\sA3KCC\msdt.exeC:\Users\Admin\AppData\Local\sA3KCC\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2908
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵PID:1496
-
C:\Users\Admin\AppData\Local\EdsfecW\tcmsetup.exeC:\Users\Admin\AppData\Local\EdsfecW\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f0dbe9b29ba7c9741c93b380072d13d0
SHA1f8f6c59414874c01ac8431fc46685c9bbf116ba8
SHA25647d33220454ccc697a0332342cba40bc1dbd7758eeef6e140e4d43e0f4e9f606
SHA512d86dafc2492d3d8a956f0449df196f78119bb3af9645ac2377ff3bec3fe935f1f6bbea9924eff9305c406d5fb8dddd82a88b6e4ef1351d65a150f1c2319b54aa
-
Filesize
1.1MB
MD538c55e731bdc8ef30acf9cd9f70ca4a1
SHA1ccf383f8cbde1fc1eac87b775837f3c053341334
SHA2568e5c7b85c3f7e17853e40099934840be4b2e534a63ca1052d3949f84ca11a44d
SHA512dd06a474a093ffda8359d9ae5c9d96964595bdcf11ffbb03f390edee2dba7cb6efdc69140124ee29d3ef3753cd7b026da9523ad9510a9d0d21aab730b2c806d1
-
Filesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
Filesize
1KB
MD529fce54ff8438520513c53058bede565
SHA1dd5c71e5c0c176138907429feb007e4f87ec5c3a
SHA2562d1b891c5cc3b8df7b9285f25dbd0732c9799d841971d5a946edcf9e44c0d577
SHA512e5cf930bcdc867b0462f46727d2b452999e60d2d95174a4f05569a2ba2acb90130916d117b7e689930365bd4d4d41b9e5a7af004b32ee619dd4276433579ced1
-
Filesize
15KB
MD50b08315da0da7f9f472fbab510bfe7b8
SHA133ba48fd980216becc532466a5ff8476bec0b31c
SHA256e19556bb7aa39bbd5f0d568a95aec0b3af18dda438cc5737f945243b24d106e7
SHA512c30501546efe2b0c003ef87ac381e901c69ddfc6791c6a5102cff3a07f56555d94995a4413b93036821aa214fc31501fa87eb519e1890ef75b2ec497983ffd58
-
Filesize
77KB
MD598e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6
-
Filesize
1.1MB
MD5cbd089792401186bc5642c358109f15a
SHA16773ef74e31284c4b0d51e96b1d730d776b3e4f0
SHA256ab7b6e1190e345c2a1dcf51bffcb62617fad2ea0f5a45262f2146fe36bdb5ec2
SHA5127791ee4886bc59df05cc09367d56fcfcf84c989c78f38c7845d1a27cc602b2273c69da93fea6d48a390284067f3b1869e6e7c3a39e446d92cc350034ec6027ef