Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
0bc57ba35fdd2ba7868a82512650b287f7168d52d25c4fddb8b423b773eaa6b1.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0bc57ba35fdd2ba7868a82512650b287f7168d52d25c4fddb8b423b773eaa6b1.dll
Resource
win10v2004-20241007-en
General
-
Target
0bc57ba35fdd2ba7868a82512650b287f7168d52d25c4fddb8b423b773eaa6b1.dll
-
Size
1.1MB
-
MD5
bd5c5e5fd3ccc87376233a873effa08e
-
SHA1
76e9011550b052c0f12294f12fa77fa53e7b309e
-
SHA256
0bc57ba35fdd2ba7868a82512650b287f7168d52d25c4fddb8b423b773eaa6b1
-
SHA512
92c6e4b56d30701b09ebdc414a8547cb41a09fa16c390d58663b2b5e861e3dcb608adcdd6cda3fc01c10fb38ca1b4d4f72d062862e9617a14eaff670c28a3cf3
-
SSDEEP
12288:wkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:wkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1256-4-0x00000000029C0000-0x00000000029C1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/844-1-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/1256-24-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/1256-36-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/1256-35-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/844-44-0x0000000140000000-0x0000000140123000-memory.dmp dridex_payload behavioral1/memory/3056-54-0x0000000140000000-0x000000014012A000-memory.dmp dridex_payload behavioral1/memory/3056-58-0x0000000140000000-0x000000014012A000-memory.dmp dridex_payload behavioral1/memory/2908-70-0x0000000140000000-0x0000000140124000-memory.dmp dridex_payload behavioral1/memory/2908-75-0x0000000140000000-0x0000000140124000-memory.dmp dridex_payload behavioral1/memory/2044-99-0x0000000140000000-0x0000000140124000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
Processes:
DevicePairingWizard.exeEhStorAuthn.exewermgr.exedwm.exepid process 3056 DevicePairingWizard.exe 2908 EhStorAuthn.exe 2912 wermgr.exe 2044 dwm.exe -
Loads dropped DLL 8 IoCs
Processes:
DevicePairingWizard.exeEhStorAuthn.exedwm.exepid process 1256 3056 DevicePairingWizard.exe 1256 2908 EhStorAuthn.exe 1256 1256 2044 dwm.exe 1256 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kgvptlq = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\lT5qIfM1\\EhStorAuthn.exe" -
Processes:
rundll32.exeDevicePairingWizard.exeEhStorAuthn.exedwm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 844 rundll32.exe 844 rundll32.exe 844 rundll32.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
description pid process target process PID 1256 wrote to memory of 2656 1256 DevicePairingWizard.exe PID 1256 wrote to memory of 2656 1256 DevicePairingWizard.exe PID 1256 wrote to memory of 2656 1256 DevicePairingWizard.exe PID 1256 wrote to memory of 3056 1256 DevicePairingWizard.exe PID 1256 wrote to memory of 3056 1256 DevicePairingWizard.exe PID 1256 wrote to memory of 3056 1256 DevicePairingWizard.exe PID 1256 wrote to memory of 1672 1256 EhStorAuthn.exe PID 1256 wrote to memory of 1672 1256 EhStorAuthn.exe PID 1256 wrote to memory of 1672 1256 EhStorAuthn.exe PID 1256 wrote to memory of 2908 1256 EhStorAuthn.exe PID 1256 wrote to memory of 2908 1256 EhStorAuthn.exe PID 1256 wrote to memory of 2908 1256 EhStorAuthn.exe PID 1256 wrote to memory of 2844 1256 wermgr.exe PID 1256 wrote to memory of 2844 1256 wermgr.exe PID 1256 wrote to memory of 2844 1256 wermgr.exe PID 1256 wrote to memory of 2912 1256 wermgr.exe PID 1256 wrote to memory of 2912 1256 wermgr.exe PID 1256 wrote to memory of 2912 1256 wermgr.exe PID 1256 wrote to memory of 1992 1256 dwm.exe PID 1256 wrote to memory of 1992 1256 dwm.exe PID 1256 wrote to memory of 1992 1256 dwm.exe PID 1256 wrote to memory of 2044 1256 dwm.exe PID 1256 wrote to memory of 2044 1256 dwm.exe PID 1256 wrote to memory of 2044 1256 dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc57ba35fdd2ba7868a82512650b287f7168d52d25c4fddb8b423b773eaa6b1.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:844
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:2656
-
C:\Users\Admin\AppData\Local\fvTiW\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\fvTiW\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3056
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵PID:1672
-
C:\Users\Admin\AppData\Local\2K2\EhStorAuthn.exeC:\Users\Admin\AppData\Local\2K2\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2908
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe1⤵PID:2844
-
C:\Users\Admin\AppData\Local\RnrhZz\wermgr.exeC:\Users\Admin\AppData\Local\RnrhZz\wermgr.exe1⤵
- Executes dropped EXE
PID:2912
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:1992
-
C:\Users\Admin\AppData\Local\Ieiktx\dwm.exeC:\Users\Admin\AppData\Local\Ieiktx\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5216e69e8abb86d4daab3f3db0c576307
SHA1abf4d4022cb4d12249522c0b583ed4cbdb4c2925
SHA256e76724e3072e4c70ef8f8941859ef5f3c69294519f018fc3cf6bba18749e0950
SHA512616826871a4fe5af27569e85fbeb587058e76a703c592081c126e8c5ad3c769678fb4d5563efea1251d91e8f507a7f3cb0008bded068cdbb5b57f2d461fe23eb
-
Filesize
1.1MB
MD54a503eb8e615d393052facfbea4d4574
SHA116f6e0dd54c233430ba34e74f4befdba1288ae2e
SHA2560371641a05c97694ec368933b0804e02ae357934fb5f939daf73a9054003f44c
SHA5126e4278ae731e21cd8d44a4e8f9cf9f812c9d607774352b86a73d97b6b5f570e73134ff0f381d3c66643a90ad7a5877790e30ba9b3f2a9aabdc3dc5ca7e799054
-
Filesize
1.2MB
MD5343dc0af5c7079c4060832ad1ef6dace
SHA1fa16b4bfc92c812de1a0ca858536fa56fb0dffe1
SHA2561b6acedb44bb5ea8c64ef2369d389aaacbf28d8e49779c2625a2a0bd98a623f0
SHA5122e6f679e242d0aee0ff723a142e5fbd21f6c9beff2df89dae167f4ad8f4f3edb168ef815b814c20c5272b5dbb41d1dbcbc9264fc6fb1c29a15438ea17b8410a6
-
Filesize
1KB
MD5d10e73f6e096e41f7757e9c9e4860ddc
SHA105c667d71c1dbbaeb4d87480b58d616d18ca987c
SHA2564766cf3263cb01e54591b6ad27af72d317d672123e62bbb6fd3817572d4944a4
SHA512340532bd5e283cefb7f41d31d25f8aa8f22388325d72a886fcd9a52d7b4e34596f6963d57ae455d62c8d593d737e3deebc4264ccabe5628bc104c4dbee5a13e1
-
Filesize
137KB
MD53abe95d92c80dc79707d8e168d79a994
SHA164b10c17f602d3f21c84954541e7092bc55bb5ab
SHA2562159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad
SHA51270fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
Filesize
49KB
MD541df7355a5a907e2c1d7804ec028965d
SHA1453263d230c6317eb4a2eb3aceeec1bbcf5e153d
SHA256207bfec939e7c017c4704ba76172ee2c954f485ba593bc1bc8c7666e78251861
SHA51259c9d69d3942543af4f387137226516adec1a4304bd5696c6c1d338f9e5f40d136450907351cce018563df1358e06a792005167f5c08c689df32d809c4cebdcf
-
Filesize
73KB
MD59728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377