Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
096c5233892113f80a9ade6545c751fd5c7e049e3357f0be6a0dc8debd18f5a0.dll
Resource
win7-20240903-en
General
-
Target
096c5233892113f80a9ade6545c751fd5c7e049e3357f0be6a0dc8debd18f5a0.dll
-
Size
1.1MB
-
MD5
29b4a43d6fa90c2c28824982c991da5d
-
SHA1
f4693227a98c1b9a031bb6ad182c5f20b83de5f1
-
SHA256
096c5233892113f80a9ade6545c751fd5c7e049e3357f0be6a0dc8debd18f5a0
-
SHA512
88fa077dc53d0bef81cdfc3d6da7f44ffc77ca3bdd5fd1818c37c0e9327fdd5b1749945393289b87f7aa2f0a2ddb11b924cea0861e83960bd858f7e353f43f2c
-
SSDEEP
12288:LkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:LkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3500-4-0x00000000033D0000-0x00000000033D1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/740-1-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/3500-24-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/3500-35-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/740-38-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/3520-46-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral2/memory/3520-50-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral2/memory/720-66-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral2/memory/944-85-0x0000000140000000-0x0000000140164000-memory.dmp dridex_payload behavioral2/memory/944-89-0x0000000140000000-0x0000000140164000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
Processes:
SystemPropertiesDataExecutionPrevention.exeshrpubw.execonsent.exewlrmdr.exepid Process 3520 SystemPropertiesDataExecutionPrevention.exe 720 shrpubw.exe 1308 consent.exe 944 wlrmdr.exe -
Loads dropped DLL 3 IoCs
Processes:
SystemPropertiesDataExecutionPrevention.exeshrpubw.exewlrmdr.exepid Process 3520 SystemPropertiesDataExecutionPrevention.exe 720 shrpubw.exe 944 wlrmdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qiqbxsgjw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\Keys\\oBf95cIH6\\shrpubw.exe" -
Processes:
shrpubw.exewlrmdr.exerundll32.exeSystemPropertiesDataExecutionPrevention.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wlrmdr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 740 rundll32.exe 740 rundll32.exe 740 rundll32.exe 740 rundll32.exe 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3500 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid Process procid_target PID 3500 wrote to memory of 1668 3500 86 PID 3500 wrote to memory of 1668 3500 86 PID 3500 wrote to memory of 3520 3500 87 PID 3500 wrote to memory of 3520 3500 87 PID 3500 wrote to memory of 888 3500 88 PID 3500 wrote to memory of 888 3500 88 PID 3500 wrote to memory of 720 3500 89 PID 3500 wrote to memory of 720 3500 89 PID 3500 wrote to memory of 1268 3500 90 PID 3500 wrote to memory of 1268 3500 90 PID 3500 wrote to memory of 1308 3500 91 PID 3500 wrote to memory of 1308 3500 91 PID 3500 wrote to memory of 904 3500 92 PID 3500 wrote to memory of 904 3500 92 PID 3500 wrote to memory of 944 3500 93 PID 3500 wrote to memory of 944 3500 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\096c5233892113f80a9ade6545c751fd5c7e049e3357f0be6a0dc8debd18f5a0.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:740
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵PID:1668
-
C:\Users\Admin\AppData\Local\OMOHlA\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\OMOHlA\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3520
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵PID:888
-
C:\Users\Admin\AppData\Local\xqJXPev7\shrpubw.exeC:\Users\Admin\AppData\Local\xqJXPev7\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:720
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Inu\consent.exeC:\Users\Admin\AppData\Local\Inu\consent.exe1⤵
- Executes dropped EXE
PID:1308
-
C:\Windows\system32\wlrmdr.exeC:\Windows\system32\wlrmdr.exe1⤵PID:904
-
C:\Users\Admin\AppData\Local\oov2si3V\wlrmdr.exeC:\Users\Admin\AppData\Local\oov2si3V\wlrmdr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD56646631ce4ad7128762352da81f3b030
SHA11095bd4b63360fc2968d75622aa745e5523428ab
SHA25656b2d516376328129132b815e22379ae8e7176825f059c9374a33cc844482e64
SHA5121c00ed5d8568f6ebd119524b61573cfe71ca828bd8fbdd150158ec8b5db65fa066908d120d201fce6222707bcb78e0c1151b82fdc1dccf3ada867cb810feb6da
-
Filesize
1.1MB
MD5ce475f2e1cf13b7e3c12a525b62041e3
SHA1fc9f129a5c6552a83a3ee45bc53fdceea7e93fd1
SHA256689ba3e0f398f3684698ed7f7491fd64f90216693e68b8d2dc3712911d083424
SHA5123fb27972798b468c91eaa4b33016c1d1391e0800d0441e7c766ae401f41e22c5f3eaef8f4a5b0d94c69c73374f80fd07224c6f1b8e10d21b97cad56d96ed030f
-
Filesize
82KB
MD5de58532954c2704f2b2309ffc320651d
SHA10a9fc98f4d47dccb0b231edf9a63309314f68e3b
SHA2561f810658969560f6e7d7a14f71d1196382e53b984ca190fa9b178ac4a32acfb3
SHA512d4d57cc30d9079f4e9193ba42631e8e53d86b22e9c655d7a8c25e5be0e5e1d6dfff4714ddc23e3e392809d623b4f8d43c63893f74c325fc77459ac03c7a451ed
-
Filesize
1.4MB
MD5d7818d0140c14893e6ebaae4c6e9c439
SHA19b50da69f3c1755d637d08cbec94c85eab458c08
SHA2568c49ffe904089cd9bc6b05b28f8bb9cede299c2030d225485f095e28de3bca1c
SHA5125f64e2aac760af3b3483fed0368032363bf1071f0e8986a6d17c5f3babdbbfb7faab7e776b505127d7742bf6978dcf1fa83fd282756bc02d1d7688709269b117
-
Filesize
66KB
MD5ef9bba7a637a11b224a90bf90a8943ac
SHA14747ec6efd2d41e049159249c2d888189bb33d1d
SHA2562fda95aafb2e9284c730bf912b93f60a75b151941adc14445ed1e056140325b1
SHA5124c1fdb8e4bf25546a2a33c95268593746f5ae2666ce36c6d9ba5833357f13720c4722231224e82308af8c156485a2c86ffd97e3093717a28d1300d3787ef1831
-
Filesize
59KB
MD59910d5c62428ec5f92b04abf9428eec9
SHA105f27d7515e8ae1fa3bc974ec65b864ec4c9ac8b
SHA2566b84e6e55d8572d7edf0b6243d00abb651fcb0cddddac8461de5f9bb80035a2e
SHA51201be043f7ff879a683e53962eec58456ba200d6787ea66581bb62669ae65d5e58a5577cdf23441165f7a535fce1dec933e3ad2465c72172b4a1488b24ce722cb
-
Filesize
1.1MB
MD5a4b229cb3100d8b0853696d4ce475dab
SHA170dde302b0892349af0f7df773313024b198358f
SHA25647194b3cf9706fcc599d5c4e454238ce1c5acc7ad4305abd79316e1e8f8a605d
SHA5123bb28e63e9ae753591cd2df94e101bebed3c13e4b9cf7e4c994e549344537acb310699c420521a7c4e61697a16cd6b6512c8b4eb0a408e3177ebcae526a3d038
-
Filesize
1KB
MD51498bc2ffcd22fccfabc3fb6fdc5e715
SHA1559e127dcb3dde5d1c38a37cc02069dcfa2677cb
SHA256d72c74bd0be359ea3c9ef82cf8515c7bc8820036df3b66b85ec5584f36b1ce78
SHA512dbd26e14c98f83357fa6148d1739758dbda6e2a87b93f67d6e0e34880c1b9a7e58356bb41a6f8486ab8b2383457053fb27febf8c10759860980e63709569f4bf