Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
079c9b54059a2d71584c2abaf4295b20bfbd0510564ec0166404a0d6cd8aa5dd.dll
Resource
win7-20240903-en
General
-
Target
079c9b54059a2d71584c2abaf4295b20bfbd0510564ec0166404a0d6cd8aa5dd.dll
-
Size
1.1MB
-
MD5
b0c305619b4621dd6b6b10af932a4b2e
-
SHA1
f3ee38cace8615b6fba326e5261f048d24e7ff74
-
SHA256
079c9b54059a2d71584c2abaf4295b20bfbd0510564ec0166404a0d6cd8aa5dd
-
SHA512
af8719bf73dc454b8b64cb7b203b4dcb097aa3ea03376c592193bf4cf4ec36204fa59b95e400a369dbd4a9a833c4d64f4c2ffb6418b82e290c3736b3dcb9a0b5
-
SSDEEP
12288:ckMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:ckMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1164-4-0x0000000003960000-0x0000000003961000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2688-1-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/1164-24-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/1164-35-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/1164-38-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/2688-44-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/3020-54-0x0000000140000000-0x0000000140124000-memory.dmp dridex_payload behavioral1/memory/3020-58-0x0000000140000000-0x0000000140124000-memory.dmp dridex_payload behavioral1/memory/3012-75-0x0000000140000000-0x0000000140124000-memory.dmp dridex_payload behavioral1/memory/1004-91-0x0000000140000000-0x0000000140124000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
sdclt.exemsra.exeSystemPropertiesAdvanced.exepid process 3020 sdclt.exe 3012 msra.exe 1004 SystemPropertiesAdvanced.exe -
Loads dropped DLL 7 IoCs
Processes:
sdclt.exemsra.exeSystemPropertiesAdvanced.exepid process 1164 3020 sdclt.exe 1164 3012 msra.exe 1164 1004 SystemPropertiesAdvanced.exe 1164 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\IGO9GP~1\\msra.exe" -
Processes:
rundll32.exesdclt.exemsra.exeSystemPropertiesAdvanced.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2688 rundll32.exe 2688 rundll32.exe 2688 rundll32.exe 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 1164 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1164 wrote to memory of 1044 1164 sdclt.exe PID 1164 wrote to memory of 1044 1164 sdclt.exe PID 1164 wrote to memory of 1044 1164 sdclt.exe PID 1164 wrote to memory of 3020 1164 sdclt.exe PID 1164 wrote to memory of 3020 1164 sdclt.exe PID 1164 wrote to memory of 3020 1164 sdclt.exe PID 1164 wrote to memory of 2900 1164 msra.exe PID 1164 wrote to memory of 2900 1164 msra.exe PID 1164 wrote to memory of 2900 1164 msra.exe PID 1164 wrote to memory of 3012 1164 msra.exe PID 1164 wrote to memory of 3012 1164 msra.exe PID 1164 wrote to memory of 3012 1164 msra.exe PID 1164 wrote to memory of 1648 1164 SystemPropertiesAdvanced.exe PID 1164 wrote to memory of 1648 1164 SystemPropertiesAdvanced.exe PID 1164 wrote to memory of 1648 1164 SystemPropertiesAdvanced.exe PID 1164 wrote to memory of 1004 1164 SystemPropertiesAdvanced.exe PID 1164 wrote to memory of 1004 1164 SystemPropertiesAdvanced.exe PID 1164 wrote to memory of 1004 1164 SystemPropertiesAdvanced.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\079c9b54059a2d71584c2abaf4295b20bfbd0510564ec0166404a0d6cd8aa5dd.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:1044
-
C:\Users\Admin\AppData\Local\BOat2bY5p\sdclt.exeC:\Users\Admin\AppData\Local\BOat2bY5p\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3020
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:2900
-
C:\Users\Admin\AppData\Local\Hx4iICm\msra.exeC:\Users\Admin\AppData\Local\Hx4iICm\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3012
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵PID:1648
-
C:\Users\Admin\AppData\Local\drEt\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\drEt\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5805518328e280e9d4f1c27ebba1fafdb
SHA15dc6866709a656c3c4645f0a1c30a7d19b6c6dc7
SHA2562c858906e72a424876e270d2b695f97ec07b407afa650232be22893d787d0908
SHA512327fc183fdd2ffd5ab21952f21712c27f938d8a5fbd7fbf70ba07ca8ccb1ccdd868a915c3ec498826425ec1916950c7172bb0a9d9dfe2fa8b62761f636c6b01a
-
Filesize
1.2MB
MD5cdebd55ffbda3889aa2a8ce52b9dc097
SHA14b3cbfff5e57fa0cb058e93e445e3851063646cf
SHA25661bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd
SHA5122af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13
-
Filesize
1.1MB
MD5de5137a192e43e272ac352847990291a
SHA15162886def7917ef9b88d103709d9b1620af0f72
SHA2565d3ab6193201899c467eccce95b0620b70f9102af21945f75a692cd633f361d6
SHA51201a8a04e46e642829a61620174b3e64726a6d1cd6a284c1b5ebee39bea64147ecfefbe75f14abfbd360bcd3a9fe7cf3287d8eaa0b7707c003fc967ace1ed53bb
-
Filesize
1KB
MD5a37caf4533401c412ce60dde2dd4feae
SHA138a9ea483aeb7b1f3f35ce410f4b0b1ab91068d0
SHA2565697bb6326a6e9bfa6974ec67f40d8ffca8d96f6f848c29ecf31f50babf9609b
SHA512ec62027d213ce5f52cee00cb2518bed913812987337373fb697a89f5d54bcbd3141ec4d1a0cc81d19c67b40ed555caf67d8a37fa5c39fa630dcc0d84a59e5437
-
Filesize
1.1MB
MD5cfc093ec8c64cb353af45554d67ec596
SHA1f0dbfcc2fa30538318c60d82ee1c3b3f3eb090e9
SHA2566bcfacf975e792bae2231e7779c20e52a6536fb73b95ff51c54de056a4ba8d6e
SHA5127d42c17c3d849816267a695c740070548d3d790b413dd90131e43369df04d13319e6efbbd3dd723c1678bceee072a5e0d07ecfdb79cd51672f9e3bcc9a5db637
-
Filesize
636KB
MD5e79df53bad587e24b3cf965a5746c7b6
SHA187a97ec159a3fc1db211f3c2c62e4d60810e7a70
SHA2564e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d
SHA5129a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb
-
Filesize
80KB
MD525dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72