Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
4bc9550e00f42cfe69cc3750a41fc7d91ddcf9a48017301742fb8f4ba472e1e3.dll
Resource
win7-20240708-en
General
-
Target
4bc9550e00f42cfe69cc3750a41fc7d91ddcf9a48017301742fb8f4ba472e1e3.dll
-
Size
1.1MB
-
MD5
406c44e26b3195a9d4fdc75506e5d5ef
-
SHA1
28abcfeeda814a917380d166fcd0aa8671fc4628
-
SHA256
4bc9550e00f42cfe69cc3750a41fc7d91ddcf9a48017301742fb8f4ba472e1e3
-
SHA512
80f7ea16ae8b1c674c80f87da2ebfbac1b4f952eb382e6ff2b7e2ebf53a7088ef13df3d92dad5aa15d698f0370138b784dc38f3ba3d02211bfc6eb42e6e780f6
-
SSDEEP
12288:hkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:hkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1196-4-0x00000000024F0000-0x00000000024F1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2080-0-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1196-24-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1196-35-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/1196-36-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2080-44-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2556-53-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2556-58-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2944-75-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload behavioral1/memory/2820-91-0x0000000140000000-0x000000014011E000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2556 dvdupgrd.exe 2944 iexpress.exe 2820 spinstall.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 Process not Found 2556 dvdupgrd.exe 1196 Process not Found 2944 iexpress.exe 1196 Process not Found 2820 spinstall.exe 1196 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcbsdqtxprcnbm = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\FLASHP~1\\sys\\TJE\\iexpress.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spinstall.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2080 rundll32.exe 2080 rundll32.exe 2080 rundll32.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 2556 dvdupgrd.exe 2556 dvdupgrd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2604 1196 Process not Found 30 PID 1196 wrote to memory of 2604 1196 Process not Found 30 PID 1196 wrote to memory of 2604 1196 Process not Found 30 PID 1196 wrote to memory of 2556 1196 Process not Found 31 PID 1196 wrote to memory of 2556 1196 Process not Found 31 PID 1196 wrote to memory of 2556 1196 Process not Found 31 PID 1196 wrote to memory of 1112 1196 Process not Found 32 PID 1196 wrote to memory of 1112 1196 Process not Found 32 PID 1196 wrote to memory of 1112 1196 Process not Found 32 PID 1196 wrote to memory of 2944 1196 Process not Found 33 PID 1196 wrote to memory of 2944 1196 Process not Found 33 PID 1196 wrote to memory of 2944 1196 Process not Found 33 PID 1196 wrote to memory of 556 1196 Process not Found 34 PID 1196 wrote to memory of 556 1196 Process not Found 34 PID 1196 wrote to memory of 556 1196 Process not Found 34 PID 1196 wrote to memory of 2820 1196 Process not Found 35 PID 1196 wrote to memory of 2820 1196 Process not Found 35 PID 1196 wrote to memory of 2820 1196 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4bc9550e00f42cfe69cc3750a41fc7d91ddcf9a48017301742fb8f4ba472e1e3.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵PID:2604
-
C:\Users\Admin\AppData\Local\B0dC4\dvdupgrd.exeC:\Users\Admin\AppData\Local\B0dC4\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵PID:1112
-
C:\Users\Admin\AppData\Local\3yVjz\iexpress.exeC:\Users\Admin\AppData\Local\3yVjz\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2944
-
C:\Windows\system32\spinstall.exeC:\Windows\system32\spinstall.exe1⤵PID:556
-
C:\Users\Admin\AppData\Local\Z3jXzsV\spinstall.exeC:\Users\Admin\AppData\Local\Z3jXzsV\spinstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5296b3250705f2ced2a8dd1d80ea17075
SHA1dd7ae8ad64283974a8fe222fab6baa62522ac071
SHA256344ef7ce68eb90035325c459d85cd8c507ff41db561d827c784467fc6b3bab2b
SHA51247f43693a0ab4af050b8cf04361108609cbacf1a0901290f19c7ffb2ed7f2eb7b5c735a44b5f48e73bafc4466c63e61cc06ac604d5b42548198449a3f9023249
-
Filesize
163KB
MD546fd16f9b1924a2ea8cd5c6716cc654f
SHA199284bc91cf829e9602b4b95811c1d72977700b6
SHA2569f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3
SHA51252c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629
-
Filesize
1.1MB
MD5bc6a7864818c96cc19eee63326a27e81
SHA16705479f1ced5c847e7bee3e5b7f10164ebf3deb
SHA25635f04b5c484b1629d14b04d67fff8d3e8007af2167b41efd3dc146a4e1a3e06c
SHA512f8a0783748155dc1bc2d7effa8020e4b4026524df6c5c7958be68fd2f73822348c981f5c99158d42f41365843f839aca492e996f88c9943d0aafb3808fe57185
-
Filesize
1.1MB
MD53463297b2a40ae881174e193bf31a002
SHA18982be4e7fc285f5943935fe117a2288d778885b
SHA25699e0681af119d09a176ac21393afe5e323b7cad7839a617f2e378aa04092ddd8
SHA5124935ea74049f8fbc929288970781cdec4d00ea7fc3dd4f72fc30cf30f9bbca7e4eb09eb316f93888683951f818462e6f409c3364db0ce80b678e83c971fb7511
-
Filesize
1KB
MD5c12a32e4ab67e74e040a1a0806de7c32
SHA1eec3d3992f56152d9137963d82f120c547f47e97
SHA2561df5d41de3c7307895e8aa27daa52e03c5c76ba7155545817e5d406dc085db86
SHA512858cb56f4f1c8daa3da1ed64811115012af8606aa87bb9adff921e7a1655eb56c8ea891be0834acdd0ff7a20a2d58d6fc2e3fd60f6c91dbe9951c54094c57918
-
Filesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
Filesize
584KB
MD529c1d5b330b802efa1a8357373bc97fe
SHA190797aaa2c56fc2a667c74475996ea1841bc368f
SHA256048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f
SHA51266f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee