Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13.dll
Resource
win10v2004-20241007-en
General
-
Target
a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13.dll
-
Size
1.1MB
-
MD5
a4b1c110a484ba5ca47588ea117ce092
-
SHA1
82f5efbb7fe1cb100d0521e64311c97ac771a875
-
SHA256
a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13
-
SHA512
fd2bfa5c05f51a8aa9ad3602ec9a6fabfb1178d42f80113bf19700260107415dacc1b7e6d7dbf3b7e2a65665f3b3776b30403f791040430c632224bb3d889309
-
SSDEEP
12288:nkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:nkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3468-3-0x0000000001560000-0x0000000001561000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/2844-0-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3468-24-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3468-35-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/2844-38-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3808-45-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral2/memory/3808-50-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral2/memory/2896-69-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/2896-73-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/732-88-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
pid Process 3808 bdeunlock.exe 2592 consent.exe 2896 BitLockerWizard.exe 732 Magnify.exe -
Loads dropped DLL 3 IoCs
pid Process 3808 bdeunlock.exe 2896 BitLockerWizard.exe 732 Magnify.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qiqbxsgjw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\OFmI\\BitLockerWizard.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdeunlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2844 regsvr32.exe 2844 regsvr32.exe 2844 regsvr32.exe 2844 regsvr32.exe 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found 3468 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3468 Process not Found -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3468 wrote to memory of 2480 3468 Process not Found 86 PID 3468 wrote to memory of 2480 3468 Process not Found 86 PID 3468 wrote to memory of 3808 3468 Process not Found 87 PID 3468 wrote to memory of 3808 3468 Process not Found 87 PID 3468 wrote to memory of 1200 3468 Process not Found 88 PID 3468 wrote to memory of 1200 3468 Process not Found 88 PID 3468 wrote to memory of 2592 3468 Process not Found 89 PID 3468 wrote to memory of 2592 3468 Process not Found 89 PID 3468 wrote to memory of 1840 3468 Process not Found 90 PID 3468 wrote to memory of 1840 3468 Process not Found 90 PID 3468 wrote to memory of 2896 3468 Process not Found 91 PID 3468 wrote to memory of 2896 3468 Process not Found 91 PID 3468 wrote to memory of 5052 3468 Process not Found 92 PID 3468 wrote to memory of 5052 3468 Process not Found 92 PID 3468 wrote to memory of 732 3468 Process not Found 93 PID 3468 wrote to memory of 732 3468 Process not Found 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
C:\Windows\system32\bdeunlock.exeC:\Windows\system32\bdeunlock.exe1⤵PID:2480
-
C:\Users\Admin\AppData\Local\ctwfFBje\bdeunlock.exeC:\Users\Admin\AppData\Local\ctwfFBje\bdeunlock.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3808
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:1200
-
C:\Users\Admin\AppData\Local\DuBrIYMd\consent.exeC:\Users\Admin\AppData\Local\DuBrIYMd\consent.exe1⤵
- Executes dropped EXE
PID:2592
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:1840
-
C:\Users\Admin\AppData\Local\Ct67t\BitLockerWizard.exeC:\Users\Admin\AppData\Local\Ct67t\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2896
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:5052
-
C:\Users\Admin\AppData\Local\WywT\Magnify.exeC:\Users\Admin\AppData\Local\WywT\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:732
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
1.1MB
MD55bf1960c1c38a314d1c834080729369f
SHA124c5956157999d8e755e73755ff0b7c746a2d24f
SHA256e1e0f57ff99e0f8328a1e6a0d986470727944a6dac724c50e7a2c0fd81bc6e8a
SHA512f6b8e16fb77d387efd7172af3e8f437c9f9ec2454f5f35cf314a0dbbdd0b7a232d0f36e9d10d302eb8a2a20729e9e6152a13f8180e410228b082152a35774a37
-
Filesize
162KB
MD56646631ce4ad7128762352da81f3b030
SHA11095bd4b63360fc2968d75622aa745e5523428ab
SHA25656b2d516376328129132b815e22379ae8e7176825f059c9374a33cc844482e64
SHA5121c00ed5d8568f6ebd119524b61573cfe71ca828bd8fbdd150158ec8b5db65fa066908d120d201fce6222707bcb78e0c1151b82fdc1dccf3ada867cb810feb6da
-
Filesize
1.1MB
MD52983940acefa752c9876173eaee1eee4
SHA127f901c5df662a2f76b3207df6a3dfafe360bcb4
SHA25608f951deb8f8ab4b481c48fff932c41e34002ba088e6ef3e2290b544a7fc4daf
SHA51268db3d4132175f529a0d4c7ed7e159314b9ebd3d4e03b25f46b34a7dce43096a91cd7363458272d13c3bdf02ccda48ea49a8c02a16079829336624ba72851c59
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
1.4MB
MD5da5d7b8676bbbd2a1236fb7cbdc4d2bb
SHA11ba886714c55649d6f97aa3697d3464ff3481890
SHA256641daa253b06c0c1e8750316eae6b115589a5924cadaa24412a348694db0a1c2
SHA5127262d6452b9948edb30dfb697dad38192cb2d75ba3dcb718bcb63cdb75d6fbd1edcdcfbbecfc35f9e6d0636d71742666d80b52d480b5c2bb2d168798f10e6c6c
-
Filesize
279KB
MD5fef5d67150c249db3c1f4b30a2a5a22e
SHA141ca037b0229be9338da4d78244b4f0ea5a3d5f3
SHA256dcfdd67bf3244ff86cadaaea50b43cce5479014ea2021c0c2fb40b7c856e5603
SHA5124ded9ca87d9d30c31ab2baededaa6e26681741ea1742d80c318173536c643a01bc049e03a03c3b45b3cb8860464a855830e12e87670503e65eedcdd5e9b2d1e7
-
Filesize
1KB
MD519cfb85f3a7f197a3e059b08c64c4ff8
SHA1d4811278fb4d38c44dc8472ec7e6e11494f74215
SHA256815eaf11c59dd7129a617da2b3470dd44f596dfbb3a9b891d88dea8586e534ad
SHA512f52f8aa77266e3b447a47e87dddf8c04d047296d9f1c5596214d22b87b6889fd7bec04335a710200e382ac0ecbdc4d92d1c1f6be800d6ae4d08d01179d7f187a