Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13.dll
Resource
win10v2004-20241007-en
General
-
Target
a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13.dll
-
Size
1.1MB
-
MD5
a4b1c110a484ba5ca47588ea117ce092
-
SHA1
82f5efbb7fe1cb100d0521e64311c97ac771a875
-
SHA256
a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13
-
SHA512
fd2bfa5c05f51a8aa9ad3602ec9a6fabfb1178d42f80113bf19700260107415dacc1b7e6d7dbf3b7e2a65665f3b3776b30403f791040430c632224bb3d889309
-
SSDEEP
12288:nkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:nkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-4-0x0000000002DF0000-0x0000000002DF1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2256-0-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1204-24-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1204-38-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1204-35-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2256-44-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2712-53-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral1/memory/2712-58-0x0000000140000000-0x000000014011F000-memory.dmp dridex_payload behavioral1/memory/2716-71-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2716-75-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/1104-90-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2712 dialer.exe 2716 msra.exe 1104 mspaint.exe -
Loads dropped DLL 7 IoCs
pid Process 1204 Process not Found 2712 dialer.exe 1204 Process not Found 2716 msra.exe 1204 Process not Found 1104 mspaint.exe 1204 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\A8JvNk\\msra.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 regsvr32.exe 2256 regsvr32.exe 2256 regsvr32.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 2712 dialer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2792 1204 Process not Found 31 PID 1204 wrote to memory of 2792 1204 Process not Found 31 PID 1204 wrote to memory of 2792 1204 Process not Found 31 PID 1204 wrote to memory of 2712 1204 Process not Found 32 PID 1204 wrote to memory of 2712 1204 Process not Found 32 PID 1204 wrote to memory of 2712 1204 Process not Found 32 PID 1204 wrote to memory of 2648 1204 Process not Found 33 PID 1204 wrote to memory of 2648 1204 Process not Found 33 PID 1204 wrote to memory of 2648 1204 Process not Found 33 PID 1204 wrote to memory of 2716 1204 Process not Found 34 PID 1204 wrote to memory of 2716 1204 Process not Found 34 PID 1204 wrote to memory of 2716 1204 Process not Found 34 PID 1204 wrote to memory of 1680 1204 Process not Found 35 PID 1204 wrote to memory of 1680 1204 Process not Found 35 PID 1204 wrote to memory of 1680 1204 Process not Found 35 PID 1204 wrote to memory of 1104 1204 Process not Found 36 PID 1204 wrote to memory of 1104 1204 Process not Found 36 PID 1204 wrote to memory of 1104 1204 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a63124e1c689fd3a1bed990b4faf822fcd0a0797b2b2b68609e7d169b494fa13.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵PID:2792
-
C:\Users\Admin\AppData\Local\0MhB\dialer.exeC:\Users\Admin\AppData\Local\0MhB\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:2648
-
C:\Users\Admin\AppData\Local\mMEkhGrUQ\msra.exeC:\Users\Admin\AppData\Local\mMEkhGrUQ\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2716
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵PID:1680
-
C:\Users\Admin\AppData\Local\hqWK\mspaint.exeC:\Users\Admin\AppData\Local\hqWK\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD54263cc1f87485f421e745565d480fa12
SHA15a959f0149138f8310a6dc3a106c9f5cc9f58971
SHA256a4a1e5a93c7e99f92be89d521e3ee8b2f4c953cceab41554a368ee4f68f1970d
SHA51279afb20831ae142ab9fc38bd9844d2df1e4d306f516eb714fc8145d2320ef56123a033b2542d5844fa93e2e4f01a052e5394d15dac395d5e9d6b0c8379662804
-
Filesize
1.1MB
MD5faccb6239830a8526fdc586474005283
SHA1a26534c110fc401b41c2313aab0e67d0e7e6865a
SHA2564bc6e8cd2ff0417ed960fdf524cdf639531e81d8c4273f2ae8108ad7c0a667e5
SHA51257b971909a888235eac416d97b433013565efb2e460f1803f8cce91fc2bb026cc05d2e6c3906cae5f9012e78a14c858d266220a7036374d68c2a8b0728ca6696
-
Filesize
1.1MB
MD5825f46e1a2273329893c2b600445b00c
SHA115599553cf35bf814e41499a8099c94fbc35ca4e
SHA256a6b4f3c955d9941982027a103d1b15b12aab617a70147e6f744d8f504cfe4dcd
SHA5123b0c63e4cedfaad2753ac186cad74f09eb25842b9db277dd9b6564142c97ffcf4b7090f80e4668303d542e778ecad80fdae5d12199ef7f42223499a90025af68
-
Filesize
636KB
MD5e79df53bad587e24b3cf965a5746c7b6
SHA187a97ec159a3fc1db211f3c2c62e4d60810e7a70
SHA2564e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d
SHA5129a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb
-
Filesize
1KB
MD5adc72dcf57fa9a24b8e3202ec61afece
SHA11dcffb1633d8990323412e96ced0388f3afb934d
SHA256730df27a2ee42002f0e45e74553cc62e104c3a822869a173d03f0f795e2786c9
SHA51241f0ed8393d8e1530026c36a499f6b50a34eab6864f1f476efb747eb7563f3a2a254e8b03930db50e4676568ec5ce780792fb9d6f7cf05e70a55146db585b56b
-
Filesize
34KB
MD546523e17ee0f6837746924eda7e9bac9
SHA1d6b2a9cc6bd3588fa9804ada5197afda6a9e034b
SHA25623d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382
SHA512c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a
-
Filesize
6.4MB
MD5458f4590f80563eb2a0a72709bfc2bd9
SHA13f97dc3bd1467c710c6a8d26b97bb6cf47deb4c6
SHA256ff923c051ae380bf30d749ebe9cf310ccab6572d84eb81b76fb1012bcbdf557f
SHA512e34500658dbe105a704fff6988b75d13aa9931adfd585b8ce1f023c61abd573d58067ee1f43e80076729ba99c9a00c17eb8cfcfac9c3d271d76bd251ccab1681