Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b.dll
Resource
win10v2004-20241007-en
General
-
Target
82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b.dll
-
Size
1.4MB
-
MD5
6ad98a87dfac01169872c8d4fcfcf27d
-
SHA1
e5c6476f15f2d64c0626335585f0f18ed917248a
-
SHA256
82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b
-
SHA512
1fef8d13244cf1a724bdac23697f48ba5bfd3af84666d713ada3684d6fc7c1b0dd0ce05fdefc898298e5b1b8986160d85787ed0e728d72293344174696b0257b
-
SSDEEP
12288:+kMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64Cu5:+kMZ+gf4ltGd8H1fYO0q2G1Ahu5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3404-4-0x00000000025B0000-0x00000000025B1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/1704-1-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/3404-24-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/3404-35-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/1704-38-0x0000000140000000-0x0000000140162000-memory.dmp dridex_payload behavioral2/memory/1308-46-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral2/memory/1308-48-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral2/memory/3588-66-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral2/memory/4632-77-0x0000000140000000-0x0000000140164000-memory.dmp dridex_payload behavioral2/memory/4632-79-0x0000000140000000-0x0000000140164000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1308 sethc.exe 3588 raserver.exe 4632 dialer.exe -
Loads dropped DLL 3 IoCs
pid Process 1308 sethc.exe 3588 raserver.exe 4632 dialer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzvdnevrdk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\AutomaticDestinations\\SD853\\raserver.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3404 wrote to memory of 2576 3404 Process not Found 86 PID 3404 wrote to memory of 2576 3404 Process not Found 86 PID 3404 wrote to memory of 1308 3404 Process not Found 87 PID 3404 wrote to memory of 1308 3404 Process not Found 87 PID 3404 wrote to memory of 4792 3404 Process not Found 88 PID 3404 wrote to memory of 4792 3404 Process not Found 88 PID 3404 wrote to memory of 3588 3404 Process not Found 89 PID 3404 wrote to memory of 3588 3404 Process not Found 89 PID 3404 wrote to memory of 3020 3404 Process not Found 90 PID 3404 wrote to memory of 3020 3404 Process not Found 90 PID 3404 wrote to memory of 4632 3404 Process not Found 91 PID 3404 wrote to memory of 4632 3404 Process not Found 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82095408cb1b096fdf360cc0ed6d8e2ba0232e62e4f37a01aa31b4fc69fc618b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Local\YUKK9kmzA\sethc.exeC:\Users\Admin\AppData\Local\YUKK9kmzA\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1308
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:4792
-
C:\Users\Admin\AppData\Local\lP1\raserver.exeC:\Users\Admin\AppData\Local\lP1\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3588
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵PID:3020
-
C:\Users\Admin\AppData\Local\7VD1IPzi7\dialer.exeC:\Users\Admin\AppData\Local\7VD1IPzi7\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD52f07195901c82e76c52401be9b86c414
SHA182b2ea5339afc5780fb859c3a6cf2a6c883b72fc
SHA256e08480a90bdd048d034784a0ce54c5760edaddac42360de24839c6b4720ef03d
SHA512e4be44aa136017983fea61c6c206b1e0099875b2d10e29ab589add09b7370f31aa20ac4ad375235a7af45df05dbac93084ddf9b8f339a0283abed2e42905a96e
-
Filesize
39KB
MD5b2626bdcf079c6516fc016ac5646df93
SHA1838268205bd97d62a31094d53643c356ea7848a6
SHA256e3ac5e6196f3a98c1946d85c653866c318bb2a86dd865deffa7b52f665d699bb
SHA512615cfe1f91b895513c687906bf3439ca352afcadd3b73f950af0a3b5fb1b358168a7a25a6796407b212fde5f803dd880bcdc350d8bac7e7594090d37ce259971
-
Filesize
1.4MB
MD59877b146afc4a6bb183c2c54074fa49b
SHA1e48b2237e422e1ac409b1c40abeeae53d97cb131
SHA256e0b5580b4a2effc9f88ab640598f09c793413241eef970d461856ba43e9dba4d
SHA5128a22afd607296efb8f993786d36bc2e4fb7fe983e878ace20f07f8cb414051b5ce6b66dbed4e191f4173b62e3adbd92881977b4e73d1e673ceec0444ea6a986e
-
Filesize
104KB
MD58ba3a9702a3f1799431cad6a290223a6
SHA19c7dc9b6830297c8f759d1f46c8b36664e26c031
SHA256615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8
SHA512680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746
-
Filesize
1.4MB
MD5d99550df69c5d6d179cb009801d11dc7
SHA1291363940ad50aa93a2eeef51a7aafb3d89929da
SHA25665c090e042a7c7d360e63a14b47451a1c4b0ac44710c9ab5fa6560c76c5a2aa7
SHA5125f9cc75bb5eb6fc2dfd07bd630d129c6c3f30ac1584deead88ef7c31027cf05bdeceff6ab473c56beba8548c4568a709a95ccac4421f467eb9c633c61c0206eb
-
Filesize
132KB
MD5d1841c6ee4ea45794ced131d4b68b60e
SHA14be6d2116060d7c723ac2d0b5504efe23198ea01
SHA25638732626242988cc5b8f97fe8d3b030d483046ef66ea90d7ea3607f1adc0600d
SHA512d8bad215872c5956c6e8acac1cd3ad19b85f72b224b068fb71cfd1493705bc7d3390853ba923a1aa461140294f8793247df018484a378e4f026c2a12cb3fa5c9
-
Filesize
1KB
MD58b980249dafdaff3a2a524939d4f04df
SHA1734e033448a18fa233eea5f106f4f3bb2a2a16c2
SHA25650417e82cf3b9caaea94128da6909002d5fe6b12b5315159b4c2ffff0bba5765
SHA512f16f8fd9465c8b1dfab5a467300e267b57d7956034e0ec408c2a531b041785165454058678feee1af5cc33018be8f0d75fe548098699b245362c72c7e3914caa