Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
4af88f0bf58a337253e7ef9a79dc197102c9e3b2f156b0d5a54998d514ee3eeb.dll
Resource
win7-20240708-en
General
-
Target
4af88f0bf58a337253e7ef9a79dc197102c9e3b2f156b0d5a54998d514ee3eeb.dll
-
Size
700KB
-
MD5
6bd456cfeba026cd573f86e5531ea384
-
SHA1
66a88b459322450c073b8c4626f9967e951775c5
-
SHA256
4af88f0bf58a337253e7ef9a79dc197102c9e3b2f156b0d5a54998d514ee3eeb
-
SHA512
a35d4de20a6d51f668e08509255b7ba6ae8085170118c23f65202eb22d7687ae1474a29227f57410e146ca3ab27397d86329acfb08c48806308665f561943f3a
-
SSDEEP
12288:pqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:pqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3428-3-0x0000000002D90000-0x0000000002D91000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1376-1-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3428-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3428-35-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/1376-38-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/4088-45-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/4088-50-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/3368-66-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/4004-77-0x0000000140000000-0x00000001400F5000-memory.dmp dridex_payload behavioral2/memory/4004-81-0x0000000140000000-0x00000001400F5000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
lpksetup.exeSystemPropertiesComputerName.exeLicensingUI.exepid process 4088 lpksetup.exe 3368 SystemPropertiesComputerName.exe 4004 LicensingUI.exe -
Loads dropped DLL 3 IoCs
Processes:
lpksetup.exeSystemPropertiesComputerName.exeLicensingUI.exepid process 4088 lpksetup.exe 3368 SystemPropertiesComputerName.exe 4004 LicensingUI.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qiqbxsgjw = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\rF22mu\\SystemPropertiesComputerName.exe" -
Processes:
SystemPropertiesComputerName.exeLicensingUI.exerundll32.exelpksetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LicensingUI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1376 rundll32.exe 1376 rundll32.exe 1376 rundll32.exe 1376 rundll32.exe 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3428 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3428 wrote to memory of 2956 3428 lpksetup.exe PID 3428 wrote to memory of 2956 3428 lpksetup.exe PID 3428 wrote to memory of 4088 3428 lpksetup.exe PID 3428 wrote to memory of 4088 3428 lpksetup.exe PID 3428 wrote to memory of 2276 3428 SystemPropertiesComputerName.exe PID 3428 wrote to memory of 2276 3428 SystemPropertiesComputerName.exe PID 3428 wrote to memory of 3368 3428 SystemPropertiesComputerName.exe PID 3428 wrote to memory of 3368 3428 SystemPropertiesComputerName.exe PID 3428 wrote to memory of 4336 3428 LicensingUI.exe PID 3428 wrote to memory of 4336 3428 LicensingUI.exe PID 3428 wrote to memory of 4004 3428 LicensingUI.exe PID 3428 wrote to memory of 4004 3428 LicensingUI.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4af88f0bf58a337253e7ef9a79dc197102c9e3b2f156b0d5a54998d514ee3eeb.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵PID:2956
-
C:\Users\Admin\AppData\Local\wrt4TjW1W\lpksetup.exeC:\Users\Admin\AppData\Local\wrt4TjW1W\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4088
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵PID:2276
-
C:\Users\Admin\AppData\Local\G835xRoO\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\G835xRoO\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3368
-
C:\Windows\system32\LicensingUI.exeC:\Windows\system32\LicensingUI.exe1⤵PID:4336
-
C:\Users\Admin\AppData\Local\BAupr\LicensingUI.exeC:\Users\Admin\AppData\Local\BAupr\LicensingUI.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
980KB
MD5d92ee8c1b0655bb37260ff013fbabb2b
SHA114f395107fa3e6bf1be2eec62646d1ec77db7168
SHA256bae46199518b9a707fda004b5fe7a0c99b2a42d64c4dcb92bdeacdce401eba5b
SHA512c0101676ff1c615fd05ca4d606dfd8ab7bc2ec2f8ee6c7dd0b4ab7e21bdf02d105a2c7f9afdb21d9ee3ae68deb8baaa61206bae9555f2298d7d58cd2f7fe3d02
-
Filesize
142KB
MD58b4abc637473c79a003d30bb9c7a05e5
SHA1d1cab953c16d4fdec2b53262f56ac14a914558ca
SHA2560e9eb89aa0df9bb84a8f11b0bb3e9d89905355de34c91508968b4cb78bc3f6c5
SHA5125a40c846c5b3a53ae09114709239d8238c322a7d3758b20ed3fc8e097fc1409f62b4990557c1192e894eabfa89741a9d88bd5175850d039b97dfdf380d1c6eeb
-
Filesize
704KB
MD59d647617ed25a9e5e3b501e848991867
SHA19b481aab6317433c7625dd68149c1ead802ff141
SHA256a23a81a12d663f9cba69cc853637232a280f86928016058e269e0a4339b00f84
SHA512d50db4f2411f8c49096cc40132e70432a3be80cffd99badf8ec08d813bd78f85223e94b8d341ab74dba19b512104ba11cea587928525bed4f4600ab2f162402b
-
Filesize
82KB
MD56711765f323289f5008a6a2a04b6f264
SHA1d8116fdf73608b4b254ad83c74f2232584d24144
SHA256bd3a97327326e2245938ec6099f20059b446ff0fe1c10b9317d15d1a1dd5331e
SHA512438abd282d9d1c0e7e5db2ce027ff9522c3980278b32b2eae09c595884a8dcbfd5178bc5926b1d15f03174303382e13f5d5ecab9a5d8e31fc07ef39e66c012e8
-
Filesize
704KB
MD5686722e71e247532c193fac076243e4f
SHA188e1ccb3f822916058b6b43e64d866ca85cc8024
SHA25698385ae9aaa300bb9a2910dc8bcd64418dbd525e7cd6f6373584b38b248a4d41
SHA512dc11189269d7058a10d1bce94b19c93c34ccf673ff11c8cb96da8f045c52ee6ad82de9be706b1615024b2cd12085b90d2f8753663ea9892bfcc3add0871ee177
-
Filesize
728KB
MD5c75516a32e0aea02a184074d55d1a997
SHA1f9396946c078f8b0f28e3a6e21a97eeece31d13f
SHA256cb3cbeaaff7c07b044f70177e2899a87e80840d177238eb7dd25b8d9e20bef22
SHA51292994fdb75b15742e33e6d7a499664b722e45b9c160d8cc42d30bc727044063d589f45853692b5b754df6ff0fd21294dc32fed985b153f93f4bcf9f8c89a5bcc
-
Filesize
1KB
MD5881cd1301cb2ac921e591a24d0bc94cc
SHA13b4aa277c074a3a73f7e235f5d3e77a6f55c5438
SHA256de6c6ef159344a4349f472e2413bf04e0fdc8fe2c1c78129abebe0cf8dce4ef1
SHA512afc125bfef75e31670e605688ef6699a57c5696dd47d768f4b10d4aed1ebf54343ab69310f725397ead51dc83d1bd109992195263c8292ae63f2edfd967feddc