Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
a92fd3d497c33998e89add2b0ad92845790a39a07380299eaa7eff993d60b371.dll
Resource
win7-20240729-en
General
-
Target
a92fd3d497c33998e89add2b0ad92845790a39a07380299eaa7eff993d60b371.dll
-
Size
1.1MB
-
MD5
220299c4d18b28c5c9adce9e905d9b77
-
SHA1
70b93b7c82770bc3a4fd2eb66edaf1b3d3443acb
-
SHA256
a92fd3d497c33998e89add2b0ad92845790a39a07380299eaa7eff993d60b371
-
SHA512
f3dd0898c251b7ff3505de8bba714a6f68983c813e42d774eca0e6e8220be9263353faac311fb2d2f19442be394ec867c86c664832dcea513f0dc6ba5eb58bef
-
SSDEEP
12288:ckMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:ckMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3420-3-0x0000000002890000-0x0000000002891000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1724-2-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3420-23-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3420-34-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/1724-37-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral2/memory/3456-44-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3456-49-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral2/memory/3356-61-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/3356-65-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral2/memory/584-76-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/584-80-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
sppsvc.exerdpinit.exewlrmdr.exepid process 3456 sppsvc.exe 3356 rdpinit.exe 584 wlrmdr.exe -
Loads dropped DLL 3 IoCs
Processes:
sppsvc.exerdpinit.exewlrmdr.exepid process 3456 sppsvc.exe 3356 rdpinit.exe 584 wlrmdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gbrhc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\Managed\\WORDDO~1\\1033\\jSTsHSm\\rdpinit.exe" -
Processes:
wlrmdr.exerundll32.exesppsvc.exerdpinit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wlrmdr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sppsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3420 -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
description pid process target process PID 3420 wrote to memory of 3456 3420 sppsvc.exe PID 3420 wrote to memory of 3456 3420 sppsvc.exe PID 3420 wrote to memory of 2684 3420 rdpinit.exe PID 3420 wrote to memory of 2684 3420 rdpinit.exe PID 3420 wrote to memory of 3356 3420 rdpinit.exe PID 3420 wrote to memory of 3356 3420 rdpinit.exe PID 3420 wrote to memory of 424 3420 wlrmdr.exe PID 3420 wrote to memory of 424 3420 wlrmdr.exe PID 3420 wrote to memory of 584 3420 wlrmdr.exe PID 3420 wrote to memory of 584 3420 wlrmdr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a92fd3d497c33998e89add2b0ad92845790a39a07380299eaa7eff993d60b371.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:2220
-
C:\Users\Admin\AppData\Local\vT49RHD\sppsvc.exeC:\Users\Admin\AppData\Local\vT49RHD\sppsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3456
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵PID:2684
-
C:\Users\Admin\AppData\Local\PI9kLz\rdpinit.exeC:\Users\Admin\AppData\Local\PI9kLz\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3356
-
C:\Windows\system32\wlrmdr.exeC:\Windows\system32\wlrmdr.exe1⤵PID:424
-
C:\Users\Admin\AppData\Local\vYQGtX\wlrmdr.exeC:\Users\Admin\AppData\Local\vYQGtX\wlrmdr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a92c62c05c980012d6879f94d540a76e
SHA1ae03d9d27ef36d69771ec94e22fe663cb755ec1e
SHA256b3e30a10e34bc225618181fdd92b4b21be8a0b23e155dd59b2309c52ef7ab89b
SHA512f9a410788ff562f3d329a25da14a97dc2510f18e52ba948f1b64e4f6323cdea18730c8aad00c7c5d4575cfc0e665b3aabb41004d12cb2195d7cf565f2e21e099
-
Filesize
343KB
MD5b0ecd76d99c5f5134aeb52460add6f80
SHA151462078092c9d6b7fa2b9544ffe0a49eb258106
SHA25651251863097f7c80ef59606152ec59e7522881c8e3886c194c43f56bcab92e1b
SHA51216855c7db48b26297c78d37d52ad03f6af0f5a58e333e17ad83b34f5e8b200c5517c6481043af0ecf1b962af2378f38600bd968592f4e1018b5a1b9400adb367
-
Filesize
1.1MB
MD55a3ae9071b6837309056a013aa3fedca
SHA167a48ea7435714b44eb81fb80bdef6867d84cbf7
SHA256860c40634d06860ddbb4990719d9732e8f38386810a42c0f0f004e624540a9c4
SHA51215b57f4b2d5352353bf3edd328e906df39415faa026e53a8702055fa66f8b9ae4bcd96062cddeff4251fa0d85e94a64dbcd3373fc5fe578eda8e10d575e09c19
-
Filesize
4.4MB
MD5ec6cef0a81f167668e18fa32f1606fce
SHA16d56837a388ae5573a38a439cee16e6dde5b4de8
SHA25682c59a2f606ebf1a8a0de16be150600ac63ad8351c6bf3952c27a70257cb70f8
SHA512f40b37675329ca7875d958b4b0019082548a563ada217c7431c2ca5c7f93957b242f095f7f04bcdd6240b97ea99e89bfe3a003f97c43366d00a93768fef7b4c5
-
Filesize
1.4MB
MD56e7fd919074be8fd21906f45ec60de76
SHA11f9846826e5bb9593685c42a6d35de40f06de850
SHA25682b11383436ec0282c8fc6b9d8ed0b9e220e00bd41183460359e8d4ccdbacae8
SHA512ca0ba562c8703419dd71f64f93a409beed774b8effce48b57f0ec9d107c6d3c594e8584a258df203cbe03e9013937e2a3de1f29d006d53d64b08a44c8abac198
-
Filesize
66KB
MD5ef9bba7a637a11b224a90bf90a8943ac
SHA14747ec6efd2d41e049159249c2d888189bb33d1d
SHA2562fda95aafb2e9284c730bf912b93f60a75b151941adc14445ed1e056140325b1
SHA5124c1fdb8e4bf25546a2a33c95268593746f5ae2666ce36c6d9ba5833357f13720c4722231224e82308af8c156485a2c86ffd97e3093717a28d1300d3787ef1831
-
Filesize
1KB
MD5ef16f25effb5d970ad1522cc591927d4
SHA131a8159566e330f3c2007471230ab9bac1efd13e
SHA256699c4df714b56aa23dc1651dfbfee4e5062db5756540d296599b3c7a7627f6c6
SHA5125c32bf0b30892aca9b29c86cfb03b81261987d99b333f1fc99e9844f7d1ad31f755a69f8e84973a68eb6e27d54626a168b4db5e7235b283fe1c9dce9c691cf06