Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 12:24
Static task
static1
Behavioral task
behavioral1
Sample
6811fbd0b434eb5dc240aba573f8d5b39e52171d540b372841071d156328135b.dll
Resource
win7-20241010-en
General
-
Target
6811fbd0b434eb5dc240aba573f8d5b39e52171d540b372841071d156328135b.dll
-
Size
1.1MB
-
MD5
e6d1c2e5b87a7ed6ba3589239a6f4df1
-
SHA1
23b73577254af4ca38171c0414b44bdee8980c50
-
SHA256
6811fbd0b434eb5dc240aba573f8d5b39e52171d540b372841071d156328135b
-
SHA512
9c6be91ff095cc8828ae4aff713ceb20e098f81e49ba3a2e61c16b9c06d99bfb14604e5074811d2a0de176748b96a06f72ad0a3d3e8b21827d43eb087b1ecae8
-
SSDEEP
12288:4kMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:4kMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3540-3-0x0000000000CB0000-0x0000000000CB1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/4952-1-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3540-23-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3540-34-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/4952-37-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/4044-44-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/4044-49-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/4712-60-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral2/memory/4712-65-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral2/memory/3996-76-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3996-80-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
SysResetErr.exeFXSCOVER.exewusa.exepid process 4044 SysResetErr.exe 4712 FXSCOVER.exe 3996 wusa.exe -
Loads dropped DLL 3 IoCs
Processes:
SysResetErr.exeFXSCOVER.exewusa.exepid process 4044 SysResetErr.exe 4712 FXSCOVER.exe 3996 wusa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fzrdqelbmr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\SYSTEM~1\\ZQNW9G~1\\FXSCOVER.exe" -
Processes:
wusa.exerundll32.exeSysResetErr.exeFXSCOVER.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4952 rundll32.exe 4952 rundll32.exe 4952 rundll32.exe 4952 rundll32.exe 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 3540 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3540 wrote to memory of 3640 3540 SysResetErr.exe PID 3540 wrote to memory of 3640 3540 SysResetErr.exe PID 3540 wrote to memory of 4044 3540 SysResetErr.exe PID 3540 wrote to memory of 4044 3540 SysResetErr.exe PID 3540 wrote to memory of 3028 3540 FXSCOVER.exe PID 3540 wrote to memory of 3028 3540 FXSCOVER.exe PID 3540 wrote to memory of 4712 3540 FXSCOVER.exe PID 3540 wrote to memory of 4712 3540 FXSCOVER.exe PID 3540 wrote to memory of 4492 3540 wusa.exe PID 3540 wrote to memory of 4492 3540 wusa.exe PID 3540 wrote to memory of 3996 3540 wusa.exe PID 3540 wrote to memory of 3996 3540 wusa.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6811fbd0b434eb5dc240aba573f8d5b39e52171d540b372841071d156328135b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵PID:3640
-
C:\Users\Admin\AppData\Local\BKt2IIcsq\SysResetErr.exeC:\Users\Admin\AppData\Local\BKt2IIcsq\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4044
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:3028
-
C:\Users\Admin\AppData\Local\caS1IE\FXSCOVER.exeC:\Users\Admin\AppData\Local\caS1IE\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4712
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:4492
-
C:\Users\Admin\AppData\Local\Dy5raN\wusa.exeC:\Users\Admin\AppData\Local\Dy5raN\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD572b55e014f0a0036033d17af992b1d3c
SHA169fd5182a34e928f2e9f05ef7d1a515d5d096ad3
SHA256c985e3d37d5719a85a45ccb63fda9c27c4839d1df6e31421ae131701a505de62
SHA512228a5393baa72ce57aac8c78fe71d927d8d62ae8ffd345b0485f633ae4bb244cb7267edf3560421e06da7d109f96828bb63ae46147bc46d1105d0ed6caabfe77
-
Filesize
41KB
MD5090c6f458d61b7ddbdcfa54e761b8b57
SHA1c5a93e9d6eca4c3842156cc0262933b334113864
SHA256a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd
SHA512c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542
-
Filesize
1.1MB
MD5b632ee33f9eceddd904f8848a1e995a3
SHA1a9547d56b0ae5cb2d806bcbd229a26d541880f4f
SHA256d9b2da0109901785d69aae5163f768424e3356d865c8947e729ed8a2c186584e
SHA512e3fb48bb365de7b0ced35fa6babab27ada9bdc89a68b2913452788d099ee7ba558757dc876a3522cdd880ae5413c0beeb0c8f812432dc1c1b2149b8c93058a63
-
Filesize
309KB
MD5e43499ee2b4cf328a81bace9b1644c5d
SHA1b2b55641f2799e3fdb3bea709c9532017bbac59d
SHA2563e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb
SHA51204823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b
-
Filesize
242KB
MD55769f78d00f22f76a4193dc720d0b2bd
SHA1d62b6cab057e88737cba43fe9b0c6d11a28b53e8
SHA25640e8e6dabfa1485b11cdccf220eb86eeaa8256e99e344cf2b2098d4cdb788a31
SHA512b4b3448a2635b21690c71254d964832e89bf947f7a0d32e79dcc84730f11d4afb4149a810a768878e52f88fc8baec45f1a2fec8e22c5301e9f39fe4fc6a57e3f
-
Filesize
1.1MB
MD51e75c3e932bfb256167b05c79c582343
SHA10506c3bc9d50964a9098a7e7d134d547f019a198
SHA256c094d7892085105604c98b5a984d209af6c885ea0b822f41f9846fa6a492a33c
SHA512fa7fbd60ac6911ac936d452f65041298424aeaadafe1c29bcc56ac4cb0075e43e85b089f5caa4eb496b22ceff041887073876ffceea1f60d95fa8a29e18fbb36
-
Filesize
1KB
MD52ec38624cfce7e68f1a02fbe440de801
SHA136c1ff839b4738af27d9a846c022eb1cea476f8e
SHA256e71f6b33fd74a87a892ffbb932835c75dd7ab6c0a004225d92ef080fdeedb243
SHA5127acf39ccf17c09c12b5f153c09763b318feb2706a658b9b35326da56b8f21ea7f8e0ea19f06f63c1ca5ef564d2b4f499b76f904dd9beacfdd10499bcc6beeb67