Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b.dll
Resource
win10v2004-20241007-en
General
-
Target
82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b.dll
-
Size
1.4MB
-
MD5
6ad98a87dfac01169872c8d4fcfcf27d
-
SHA1
e5c6476f15f2d64c0626335585f0f18ed917248a
-
SHA256
82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b
-
SHA512
1fef8d13244cf1a724bdac23697f48ba5bfd3af84666d713ada3684d6fc7c1b0dd0ce05fdefc898298e5b1b8986160d85787ed0e728d72293344174696b0257b
-
SSDEEP
12288:+kMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64Cu5:+kMZ+gf4ltGd8H1fYO0q2G1Ahu5
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1212-4-0x0000000002D00000-0x0000000002D01000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1060-1-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral1/memory/1212-24-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral1/memory/1212-35-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral1/memory/1212-36-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral1/memory/1060-44-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral1/memory/2960-54-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral1/memory/2960-58-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral1/memory/3056-75-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral1/memory/1712-91-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
rdpinit.exeslui.execttune.exepid process 2960 rdpinit.exe 3056 slui.exe 1712 cttune.exe -
Loads dropped DLL 7 IoCs
Processes:
rdpinit.exeslui.execttune.exepid process 1212 2960 rdpinit.exe 1212 3056 slui.exe 1212 1712 cttune.exe 1212 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rcoehfpd = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\zvY7mJ4njFj\\slui.exe" -
Processes:
slui.execttune.exerundll32.exerdpinit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1060 rundll32.exe 1060 rundll32.exe 1060 rundll32.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1212 wrote to memory of 2872 1212 rdpinit.exe PID 1212 wrote to memory of 2872 1212 rdpinit.exe PID 1212 wrote to memory of 2872 1212 rdpinit.exe PID 1212 wrote to memory of 2960 1212 rdpinit.exe PID 1212 wrote to memory of 2960 1212 rdpinit.exe PID 1212 wrote to memory of 2960 1212 rdpinit.exe PID 1212 wrote to memory of 2688 1212 slui.exe PID 1212 wrote to memory of 2688 1212 slui.exe PID 1212 wrote to memory of 2688 1212 slui.exe PID 1212 wrote to memory of 3056 1212 slui.exe PID 1212 wrote to memory of 3056 1212 slui.exe PID 1212 wrote to memory of 3056 1212 slui.exe PID 1212 wrote to memory of 1480 1212 cttune.exe PID 1212 wrote to memory of 1480 1212 cttune.exe PID 1212 wrote to memory of 1480 1212 cttune.exe PID 1212 wrote to memory of 1712 1212 cttune.exe PID 1212 wrote to memory of 1712 1212 cttune.exe PID 1212 wrote to memory of 1712 1212 cttune.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵PID:2872
-
C:\Users\Admin\AppData\Local\nvt4S\rdpinit.exeC:\Users\Admin\AppData\Local\nvt4S\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2960
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2688
-
C:\Users\Admin\AppData\Local\2TlEi\slui.exeC:\Users\Admin\AppData\Local\2TlEi\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3056
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵PID:1480
-
C:\Users\Admin\AppData\Local\13PIGUXQ\cttune.exeC:\Users\Admin\AppData\Local\13PIGUXQ\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56a69ad9083d778c88fd7ecc492d37f1d
SHA1588214dbf1989727586ec98739cf470356ddbdb6
SHA2562481ce44c463f0f3423bffeec5b8b6e8ac172ba3b5046766856733d8ea8625d1
SHA512cfa22fc902588203f2623b38ef468e1e4806f7764eac77761f6a21faa1f4c409e3bff6b04445bdd4f06aa93fa4469516caf6bea3fc72f9a30504f1a5c3df0835
-
Filesize
1.4MB
MD5e756ac114ad29b380a7be7517cfc23f5
SHA1608d2b3eab3d33d20b22882652467a611b0a05bb
SHA256c4d8b93699640f223ba5e5472f1ce431b89d974f964b4bb05d490d0ec9590b9b
SHA512e0d9a6da216af21150d9af69d833a116603e5411b60ea0873a0b28e2afd2ff8980bb56a9baba89f66ccefee684bf80f9ee976c925678b2a63df8765fb71f671c
-
Filesize
1.4MB
MD5ccb3d608eae5db928c3dce20d1c97ab8
SHA1591bfe3aa2515b2967bd7d26f7b87f7391b1d78e
SHA25640841c6eff58cddf6be1423d05bdaf53d0c9883ddaff561246722a15045db8db
SHA512b20fadd3b92efa475ec9dc76ac5869943387e5e19e8365764cd41f4bcf49b7aa67f591c1a82dec6f84bcd0f49507a97af311571a02481a87286f64fc84daf130
-
Filesize
174KB
MD5664e12e0ea009cc98c2b578ff4983c62
SHA127b302c0108851ac6cc37e56590dd9074b09c3c9
SHA25600bd9c3c941a5a9b4fc8594d7b985f5f1ac48f0ba7495a728b8fa42b4b48a332
SHA512f5eee4e924dcc3cf5e82eff36543e9d0e9c17dc2272b403cf30f8d2da42312821f5566249a98a952f5441b1f0d6d61a86b5c5198bc598d65ea9d4fb35822505d
-
Filesize
904B
MD5464e8c8dde0ec1566556117248fe2e8f
SHA12bf0807f9b74b06e6ac1ce70581e9aaa8b52775f
SHA256ad5f02dc259ab21d0711701d29af99db6f5c39ecb739217c610fc6d7d90e839a
SHA512b7b66fab75cc0d685847fa7fd6425db81583c69fe18532f072027d1796e64e49ae586b649f70b32ddf4f382215c1e5dd3880f926374ef425f8f09a4799b20075
-
Filesize
314KB
MD57116848fd23e6195fcbbccdf83ce9af4
SHA135fb16a0b68f8a84d5dfac8c110ef5972f1bee93
SHA25639937665f72725bdb3b82389a5dbd906c63f4c14208312d7f7a59d6067e1cfa6
SHA512e38bf57eee5836b8598dd88dc3d266f497d911419a8426f73df6dcaa503611a965aabbd746181cb19bc38eebdb48db778a17f781a8f9e706cbd7a6ebec38f894
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c