Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
a92fd3d497c33998e89add2b0ad92845790a39a07380299eaa7eff993d60b371.dll
Resource
win7-20240729-en
General
-
Target
a92fd3d497c33998e89add2b0ad92845790a39a07380299eaa7eff993d60b371.dll
-
Size
1.1MB
-
MD5
220299c4d18b28c5c9adce9e905d9b77
-
SHA1
70b93b7c82770bc3a4fd2eb66edaf1b3d3443acb
-
SHA256
a92fd3d497c33998e89add2b0ad92845790a39a07380299eaa7eff993d60b371
-
SHA512
f3dd0898c251b7ff3505de8bba714a6f68983c813e42d774eca0e6e8220be9263353faac311fb2d2f19442be394ec867c86c664832dcea513f0dc6ba5eb58bef
-
SSDEEP
12288:ckMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:ckMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1396-4-0x00000000024D0000-0x00000000024D1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2296-0-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1396-23-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1396-34-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1396-35-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/2296-43-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1852-53-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1852-57-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1428-74-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1944-90-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
tabcal.exesdclt.exeSoundRecorder.exepid process 1852 tabcal.exe 1428 sdclt.exe 1944 SoundRecorder.exe -
Loads dropped DLL 7 IoCs
Processes:
tabcal.exesdclt.exeSoundRecorder.exepid process 1396 1852 tabcal.exe 1396 1428 sdclt.exe 1396 1944 SoundRecorder.exe 1396 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\xTFTB\\sdclt.exe" -
Processes:
rundll32.exetabcal.exesdclt.exeSoundRecorder.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoundRecorder.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1396 wrote to memory of 3032 1396 tabcal.exe PID 1396 wrote to memory of 3032 1396 tabcal.exe PID 1396 wrote to memory of 3032 1396 tabcal.exe PID 1396 wrote to memory of 1852 1396 tabcal.exe PID 1396 wrote to memory of 1852 1396 tabcal.exe PID 1396 wrote to memory of 1852 1396 tabcal.exe PID 1396 wrote to memory of 2384 1396 sdclt.exe PID 1396 wrote to memory of 2384 1396 sdclt.exe PID 1396 wrote to memory of 2384 1396 sdclt.exe PID 1396 wrote to memory of 1428 1396 sdclt.exe PID 1396 wrote to memory of 1428 1396 sdclt.exe PID 1396 wrote to memory of 1428 1396 sdclt.exe PID 1396 wrote to memory of 2420 1396 SoundRecorder.exe PID 1396 wrote to memory of 2420 1396 SoundRecorder.exe PID 1396 wrote to memory of 2420 1396 SoundRecorder.exe PID 1396 wrote to memory of 1944 1396 SoundRecorder.exe PID 1396 wrote to memory of 1944 1396 SoundRecorder.exe PID 1396 wrote to memory of 1944 1396 SoundRecorder.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a92fd3d497c33998e89add2b0ad92845790a39a07380299eaa7eff993d60b371.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:3032
-
C:\Users\Admin\AppData\Local\g62wA8j\tabcal.exeC:\Users\Admin\AppData\Local\g62wA8j\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1852
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:2384
-
C:\Users\Admin\AppData\Local\2EVH\sdclt.exeC:\Users\Admin\AppData\Local\2EVH\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1428
-
C:\Windows\system32\SoundRecorder.exeC:\Windows\system32\SoundRecorder.exe1⤵PID:2420
-
C:\Users\Admin\AppData\Local\bOiPh\SoundRecorder.exeC:\Users\Admin\AppData\Local\bOiPh\SoundRecorder.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD51bd36d3ca1974e8eff4e0f63abaaf0d2
SHA138682936448bedd06e7800e295ff576334dda2a6
SHA256c19fe49f712888de6de1a586346209b2c2945b8c2f70e0a108bb9b553b12c9a1
SHA512eb635e2bc011c7d92d40e771f64957756638f5002c0d4e8a2fd18f8cdd9e2a0b6188b31d6e7fa83744d64eda3df6cfd75afbdba129bb15aaef6757fb9cc308fc
-
Filesize
1.1MB
MD5df19796acf728fc085de77bf441fb0ba
SHA13b107415c35f2663c2310012591f9e7789add363
SHA256f54632401c1cfd14ee48fa6b0c9977b6d36f8f8b0b38f358808b769fac660b60
SHA512d617db7003e0ae47f39dd80cf94345b6a39eb0ed5cdf4a20df377c411a7700c55bb26b4895ac915670da740570b3eaddcad0c8bdea813581440971d391f81f4a
-
Filesize
1.1MB
MD54fa098c7fb57f10cc782eb1d97595a85
SHA1c9e31f6abb2339070accb7f16c76094e1e407493
SHA256bb54e55a0555d0dde27022d95525e228bd10e84af60978ea4ef895a88554191f
SHA51252313c323797eb288c00451110c473ae94e80c63c5830f115f047fe633ebe5e390ce4ae03d7841b90bf22b4ce2e9ac1502ad6c21b31c9fda43475014626cfa53
-
Filesize
1KB
MD58c464ced1b5963ba993399964b4a9b26
SHA10c73441414446fb60e2a2428e606a31aab17ca9b
SHA256c0d767c43b7eaba2f928e10395ae4870c39514d1211ac43e2a8a95fb149c1bd3
SHA512ded4d46c3aaf05703bdfc4b91d378b7e16963993939d36d8328b0e577e4c3fe4d3c78c836928544283927f47f7b960875e03a4a25744a41200b257674dc5fa4a
-
Filesize
1.2MB
MD5cdebd55ffbda3889aa2a8ce52b9dc097
SHA14b3cbfff5e57fa0cb058e93e445e3851063646cf
SHA25661bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd
SHA5122af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13
-
Filesize
139KB
MD547f0f526ad4982806c54b845b3289de1
SHA18420ea488a2e187fe1b7fcfb53040d10d5497236
SHA256e81b11fe30b16fa4e3f08810513c245248adce8566355a8f2a19c63b1143ff5b
SHA5124c9a1aa5ed55087538c91a77d7420932263b69e59dc57b1db738e59624265b734bf29e2b6ed8d0adb2e0dec5763bfbf86876fd7d1139c21e829001c7868d515d
-
Filesize
77KB
MD598e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6