Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
e290de84b0aa6e41b165970f2232c7f9df6793af3773e6713badd471aa7ab697.dll
Resource
win7-20240729-en
General
-
Target
e290de84b0aa6e41b165970f2232c7f9df6793af3773e6713badd471aa7ab697.dll
-
Size
1.4MB
-
MD5
761c54dc1cf33fe2056c26e668929d7a
-
SHA1
81394606e1b3ff225eff9172d0b2ca7004816c0d
-
SHA256
e290de84b0aa6e41b165970f2232c7f9df6793af3773e6713badd471aa7ab697
-
SHA512
d7500315bf5a414782736b5f41c9d095a56f4ab05c5e0e392a90d267149a6542fe44ac9755297dcca987ee52e22395faedba7a99a93526e0db86e7e14086fc65
-
SSDEEP
12288:jkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64Caa:jkMZ+gf4ltGd8H1fYO0q2G1Ah9
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3360-4-0x0000000002370000-0x0000000002371000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/2388-0-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/3360-24-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/3360-35-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/2388-38-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/3132-45-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral2/memory/3132-50-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral2/memory/1816-66-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral2/memory/3516-81-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
BdeUISrv.exeAgentService.exeSystemSettingsAdminFlows.exepid process 3132 BdeUISrv.exe 1816 AgentService.exe 3516 SystemSettingsAdminFlows.exe -
Loads dropped DLL 3 IoCs
Processes:
BdeUISrv.exeAgentService.exeSystemSettingsAdminFlows.exepid process 3132 BdeUISrv.exe 1816 AgentService.exe 3516 SystemSettingsAdminFlows.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sarxmtvezib = "C:\\Users\\Admin\\AppData\\Roaming\\Sun\\Java\\xmpqg\\AgentService.exe" -
Processes:
rundll32.exeBdeUISrv.exeAgentService.exeSystemSettingsAdminFlows.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AgentService.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsAdminFlows.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2388 rundll32.exe 2388 rundll32.exe 2388 rundll32.exe 2388 rundll32.exe 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 3360 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3360 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3360 wrote to memory of 32 3360 BdeUISrv.exe PID 3360 wrote to memory of 32 3360 BdeUISrv.exe PID 3360 wrote to memory of 3132 3360 BdeUISrv.exe PID 3360 wrote to memory of 3132 3360 BdeUISrv.exe PID 3360 wrote to memory of 2096 3360 AgentService.exe PID 3360 wrote to memory of 2096 3360 AgentService.exe PID 3360 wrote to memory of 1816 3360 AgentService.exe PID 3360 wrote to memory of 1816 3360 AgentService.exe PID 3360 wrote to memory of 3896 3360 SystemSettingsAdminFlows.exe PID 3360 wrote to memory of 3896 3360 SystemSettingsAdminFlows.exe PID 3360 wrote to memory of 3516 3360 SystemSettingsAdminFlows.exe PID 3360 wrote to memory of 3516 3360 SystemSettingsAdminFlows.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e290de84b0aa6e41b165970f2232c7f9df6793af3773e6713badd471aa7ab697.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:32
-
C:\Users\Admin\AppData\Local\K12QS\BdeUISrv.exeC:\Users\Admin\AppData\Local\K12QS\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3132
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:2096
-
C:\Users\Admin\AppData\Local\WcBLcaJ2a\AgentService.exeC:\Users\Admin\AppData\Local\WcBLcaJ2a\AgentService.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1816
-
C:\Windows\system32\SystemSettingsAdminFlows.exeC:\Windows\system32\SystemSettingsAdminFlows.exe1⤵PID:3896
-
C:\Users\Admin\AppData\Local\TtpXP\SystemSettingsAdminFlows.exeC:\Users\Admin\AppData\Local\TtpXP\SystemSettingsAdminFlows.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD58595075667ff2c9a9f9e2eebc62d8f53
SHA1c48b54e571f05d4e21d015bb3926c2129f19191a
SHA25620b05c77f898be08737082e969b39f54fa39753c8c0a06142eb7ad5e0764a2db
SHA512080dbcdd9234c07efe6cea4919ffa305fdc381ccebed9d1020dd6551b54e20e52387e62a344502fa4a85249defd0f9b506528b8dd34675bc9f51f664b8fc4d88
-
Filesize
1.4MB
MD57ff9cc290f759c2a376253a9b8be49ea
SHA1e7e747f0b0dc431d447be06dcefc5fd05680680b
SHA256048cdb162976ec31cb9e7dc515586ab2d53413185b39375b3d47726f2cddb923
SHA51223c45a50959d0ed54c043788b29dfc472bc80548c784c2f560b247734676b7780d5a52d18d818ce119d1f819ddfd396fdc9c94b2053dc02fe825633b9bb48f31
-
Filesize
506KB
MD550adb2c7c145c729b9de8b7cf967dd24
SHA1a31757f08da6f95156777c1132b6d5f1db3d8f30
SHA256a7a2e7122d27308df37b7ab718ef3ac239e4216669f51331e34e205f59fb0aec
SHA512715b4c93e79e896da1cf86cf4455a84cba1aeac34b6fd72d2afdf203a2034f6f8fac1d6501f0dd277a17bd1d7ab73ddd1887e01a99f2d26f39efeb94d0aac9b0
-
Filesize
1.4MB
MD58a1954f84a1cd8004419ae141eb13d47
SHA134e36e5763a0c88d6c87775d8a6205a342a63afa
SHA256fd299915b7f83c626a61f9bc34e80a6a10341e1d21c1f53dd67e56f34a9fd299
SHA5128d9affd5c3abf3a4cb8ba491eb1c000498329b663734541330fb5b9a6c7df70812b9e253ab9e3d625db9ab726447f81a8f2ebeb6fb930c5c81a51b0cc5955dad
-
Filesize
1.2MB
MD5f8bac206def3e87ceb8ef3cb0fb5a194
SHA1a28ea816e7b5ca511da4576262a5887a75171276
SHA256c69e4520d5dd84a409c2df1825ba30ec367400e4f7b001c8e971da8bef1a2268
SHA5128df9a814c738e79492a3b72ba359bf3aedfb89fe02215ef58e743c541a2194ba47e227969d76c55387eee6eb367ca68e4b3cdf054022cb86e62376cc2fdef909
-
Filesize
1.4MB
MD5c4a43ab6105dc02e4a8d59381e3633e0
SHA1056b7ed5938cbdde56347e23cafbcb602fb07b74
SHA256e5419d5cdafdfa5b0009a0e0dfdb1d8b127a098eea95e4daac1296383ab6ab7a
SHA5123aaac9cd3d2823ab9d77445e376ee6c3ef5af554ba1e90e3dd109de43bab489037fff6bfb3a47eada46065abffd3e9aac02467417d6bd5a755e65d5249a5b9bb
-
Filesize
1KB
MD5e9dff1e12cbc5f73026280902fae80f3
SHA1da79e092a05a76a9455a4b9c8bc3211475aee5f6
SHA256f07385152cfd2c483315176ab42165813c5b54fa7868ab3c21f5248c9e5a4107
SHA5127b4fb85a1536ccd240236b1b7b94c70496c73010523ec1b95ae4f183150c9268b80f000c341cd1cdfafc52ff263b5aab10229ac62f39eb40620626494c1f0c15