Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
8942de37f64cd1f04b7022ad6d9713df408d9e9449e3942161ccebb970fdc109.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8942de37f64cd1f04b7022ad6d9713df408d9e9449e3942161ccebb970fdc109.dll
Resource
win10v2004-20241007-en
General
-
Target
8942de37f64cd1f04b7022ad6d9713df408d9e9449e3942161ccebb970fdc109.dll
-
Size
1.2MB
-
MD5
b8839ffc79f088860701573eae079ec2
-
SHA1
88323714954aec18328ded2cb0a7ea08d5f5714d
-
SHA256
8942de37f64cd1f04b7022ad6d9713df408d9e9449e3942161ccebb970fdc109
-
SHA512
4b6d7a362f6f52721a026ce293d9d0b647cea983bc52a896022cf605b6abe127a5532cba24bc07f579ea6e6b0bc542e1b62d93a746015cf606b69c50e5f5ad41
-
SSDEEP
12288:KqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed0j:KqGBHTxvt+g2gYed0
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1188-4-0x0000000002E20000-0x0000000002E21000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2536-0-0x0000000140000000-0x0000000140128000-memory.dmp dridex_payload behavioral1/memory/1188-25-0x0000000140000000-0x0000000140128000-memory.dmp dridex_payload behavioral1/memory/1188-37-0x0000000140000000-0x0000000140128000-memory.dmp dridex_payload behavioral1/memory/1188-36-0x0000000140000000-0x0000000140128000-memory.dmp dridex_payload behavioral1/memory/2536-45-0x0000000140000000-0x0000000140128000-memory.dmp dridex_payload behavioral1/memory/2944-54-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral1/memory/2944-59-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral1/memory/2304-76-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral1/memory/2952-88-0x0000000140000000-0x000000014012A000-memory.dmp dridex_payload behavioral1/memory/2952-92-0x0000000140000000-0x000000014012A000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
vmicsvc.exemsra.exerrinstaller.exepid process 2944 vmicsvc.exe 2304 msra.exe 2952 rrinstaller.exe -
Loads dropped DLL 7 IoCs
Processes:
vmicsvc.exemsra.exerrinstaller.exepid process 1188 2944 vmicsvc.exe 1188 2304 msra.exe 1188 2952 rrinstaller.exe 1188 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\xMDNIJ9QN\\msra.exe" -
Processes:
rundll32.exevmicsvc.exemsra.exerrinstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2536 rundll32.exe 2536 rundll32.exe 2536 rundll32.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1188 wrote to memory of 1224 1188 vmicsvc.exe PID 1188 wrote to memory of 1224 1188 vmicsvc.exe PID 1188 wrote to memory of 1224 1188 vmicsvc.exe PID 1188 wrote to memory of 2944 1188 vmicsvc.exe PID 1188 wrote to memory of 2944 1188 vmicsvc.exe PID 1188 wrote to memory of 2944 1188 vmicsvc.exe PID 1188 wrote to memory of 2732 1188 msra.exe PID 1188 wrote to memory of 2732 1188 msra.exe PID 1188 wrote to memory of 2732 1188 msra.exe PID 1188 wrote to memory of 2304 1188 msra.exe PID 1188 wrote to memory of 2304 1188 msra.exe PID 1188 wrote to memory of 2304 1188 msra.exe PID 1188 wrote to memory of 1476 1188 rrinstaller.exe PID 1188 wrote to memory of 1476 1188 rrinstaller.exe PID 1188 wrote to memory of 1476 1188 rrinstaller.exe PID 1188 wrote to memory of 2952 1188 rrinstaller.exe PID 1188 wrote to memory of 2952 1188 rrinstaller.exe PID 1188 wrote to memory of 2952 1188 rrinstaller.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8942de37f64cd1f04b7022ad6d9713df408d9e9449e3942161ccebb970fdc109.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵PID:1224
-
C:\Users\Admin\AppData\Local\dPP19d\vmicsvc.exeC:\Users\Admin\AppData\Local\dPP19d\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2944
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:2732
-
C:\Users\Admin\AppData\Local\QMnD3B\msra.exeC:\Users\Admin\AppData\Local\QMnD3B\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2304
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:1476
-
C:\Users\Admin\AppData\Local\noxAcm\rrinstaller.exeC:\Users\Admin\AppData\Local\noxAcm\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57fb3a611ec8e1de7cc99e57ccbd67218
SHA1a2df507bd86b72237431eced8ecc0442b74fe1cb
SHA25663aed74d1a324d0a5fc6411bf52c605eeb33ec890ebbea941fd1dcbadffdfef7
SHA51279b60b9fa158462b499ae1e0be324cda021fdedf45ec19be20d73bbe2436d539393a6e608477fa9f4eead948a50706b4997cf93b17c8b87e50231f2fa75395f4
-
Filesize
1.2MB
MD59e602b0f737954054941f0606f7aef2c
SHA107b72db2d21c662bd2719e3d0b025fa7bae957f6
SHA256e3c3cedbd716177a7569b850081d7c289c3dbad4c1305b6ffa49e2489702bf7c
SHA512f0c4ac27b06586551fec09dabcfc82796ce44514fd1cd997240882779c65b7257ce747d35e61027c671624268c34ef07fe58299230fda6e604a27045d07cc924
-
Filesize
1.2MB
MD572c9bd2981d90b299212d0893bccffae
SHA15ca154117b2db90abe441afe9c12994a7a1a639f
SHA25657c4fa4ffbc46669a5c9eeb4dd752c82490b7b13304f884b3be5e93aee749391
SHA512a2795433e431b13cf119047b7b638e344c7ea051b56a2a65a0c7df58dac99c9c668f2da061ed02974812f43372111b21c5ce26fccd539dcdfcbfb72488594777
-
Filesize
1KB
MD5a495d87aca3e254c3f192902d73247a2
SHA12ed2d89b0c330cd2423b9d2bfefb7517a04265b0
SHA25642dfbe36f64cecc34dc527b7d1a9f188fdc51cfa475941ba8cc660dc6b3c29c6
SHA512cd500fe95c0ad5842f6bcf090eabfe2ebcb65849ace5e11c2076c04620fc851da8ee94dd27648d20616fefe6d17fb23e17d6a3cd72d38b96c88bc350854ccece
-
Filesize
636KB
MD5e79df53bad587e24b3cf965a5746c7b6
SHA187a97ec159a3fc1db211f3c2c62e4d60810e7a70
SHA2564e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d
SHA5129a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb
-
Filesize
238KB
MD579e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4