Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
772c9a9a5936ebf7ae74095e3bbc84543b533e0c07cfadc1f9359c3b95586e20.dll
Resource
win7-20240708-en
General
-
Target
772c9a9a5936ebf7ae74095e3bbc84543b533e0c07cfadc1f9359c3b95586e20.dll
-
Size
908KB
-
MD5
b0125ea2f2268bfbaf1303fbe6ed2b19
-
SHA1
046b69664e5e091563dbcf675197e076aca32e79
-
SHA256
772c9a9a5936ebf7ae74095e3bbc84543b533e0c07cfadc1f9359c3b95586e20
-
SHA512
b3550b5eb6f07cdb4ec5e81a2c64470bea8191dda4920007fd2bdfa7c6fec977c90b7d62247b9f5d488e8df64c1abfb98494f986e353c9e143cc26eed1476099
-
SSDEEP
12288:6qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:6qGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3460-4-0x0000000000770000-0x0000000000771000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1564-1-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral2/memory/3460-36-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral2/memory/3460-25-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral2/memory/1564-39-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral2/memory/3048-46-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral2/memory/3048-51-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral2/memory/2088-67-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral2/memory/1292-78-0x0000000140000000-0x00000001400E5000-memory.dmp dridex_payload behavioral2/memory/1292-82-0x0000000140000000-0x00000001400E5000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
bdechangepin.exeWindowsActionDialog.exeProximityUxHost.exepid process 3048 bdechangepin.exe 2088 WindowsActionDialog.exe 1292 ProximityUxHost.exe -
Loads dropped DLL 3 IoCs
Processes:
bdechangepin.exeWindowsActionDialog.exeProximityUxHost.exepid process 3048 bdechangepin.exe 2088 WindowsActionDialog.exe 1292 ProximityUxHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzvdnevrdk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\3OEXAP~1\\WINDOW~1.EXE" -
Processes:
bdechangepin.exeWindowsActionDialog.exeProximityUxHost.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdechangepin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsActionDialog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ProximityUxHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1564 rundll32.exe 1564 rundll32.exe 1564 rundll32.exe 1564 rundll32.exe 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3460 Token: SeCreatePagefilePrivilege 3460 Token: SeShutdownPrivilege 3460 Token: SeCreatePagefilePrivilege 3460 Token: SeShutdownPrivilege 3460 Token: SeCreatePagefilePrivilege 3460 Token: SeShutdownPrivilege 3460 Token: SeCreatePagefilePrivilege 3460 Token: SeShutdownPrivilege 3460 Token: SeCreatePagefilePrivilege 3460 Token: SeShutdownPrivilege 3460 Token: SeCreatePagefilePrivilege 3460 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3460 3460 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3460 wrote to memory of 3448 3460 bdechangepin.exe PID 3460 wrote to memory of 3448 3460 bdechangepin.exe PID 3460 wrote to memory of 3048 3460 bdechangepin.exe PID 3460 wrote to memory of 3048 3460 bdechangepin.exe PID 3460 wrote to memory of 2664 3460 WindowsActionDialog.exe PID 3460 wrote to memory of 2664 3460 WindowsActionDialog.exe PID 3460 wrote to memory of 2088 3460 WindowsActionDialog.exe PID 3460 wrote to memory of 2088 3460 WindowsActionDialog.exe PID 3460 wrote to memory of 4512 3460 ProximityUxHost.exe PID 3460 wrote to memory of 4512 3460 ProximityUxHost.exe PID 3460 wrote to memory of 1292 3460 ProximityUxHost.exe PID 3460 wrote to memory of 1292 3460 ProximityUxHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\772c9a9a5936ebf7ae74095e3bbc84543b533e0c07cfadc1f9359c3b95586e20.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
C:\Windows\system32\bdechangepin.exeC:\Windows\system32\bdechangepin.exe1⤵PID:3448
-
C:\Users\Admin\AppData\Local\bsLNK\bdechangepin.exeC:\Users\Admin\AppData\Local\bsLNK\bdechangepin.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3048
-
C:\Windows\system32\WindowsActionDialog.exeC:\Windows\system32\WindowsActionDialog.exe1⤵PID:2664
-
C:\Users\Admin\AppData\Local\TEMPt\WindowsActionDialog.exeC:\Users\Admin\AppData\Local\TEMPt\WindowsActionDialog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2088
-
C:\Windows\system32\ProximityUxHost.exeC:\Windows\system32\ProximityUxHost.exe1⤵PID:4512
-
C:\Users\Admin\AppData\Local\UhiJ\ProximityUxHost.exeC:\Users\Admin\AppData\Local\UhiJ\ProximityUxHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5326a1e774d226b95b45eb3b35180ace4
SHA14702cd176b24be89988c378386e5a8a89cd9d8df
SHA256057982fa0ed6b2096931124d3e53b876af91c0a458bbc0c74ef774d1e79e8049
SHA512e79fd7201bc32f389744cb5295808a22e7d6f59365fa926914a0abee2744f50b09fe6fb53180a02992b5d4b3e792924e59b93189887f35f9f073c08f03cfabb5
-
Filesize
61KB
MD573c523b6556f2dc7eefc662338d66f8d
SHA11e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5
SHA2560c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31
SHA51269d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912
-
Filesize
263KB
MD59ea326415b83d77295c70a35feb75577
SHA1f8fc6a4f7f97b242f35066f61d305e278155b8a8
SHA256192bfde77bf280e48f92d1eceacdc7ec4bf31cda46f7d577c7d7c3ec3ac89d8f
SHA5122b1943600f97abcd18778101e33eac00c2bd360a3eff62fef65f668a084d8fa38c3bbdedfc6c2b7e8410aa7c9c3df2734705dc502b4754259121adc9198c3692
-
Filesize
916KB
MD5ec81df4e425af9fc1c34daeb9ef53414
SHA17f2990d5327a825f05699813978747a4e8c3e9e7
SHA256c821c7e7a4293b7f166f30f3a3abfec58769dff8b9ab4c96c289cb5cbd80ea5c
SHA5124fc30b570ea77919a32da23a3ea89b40418f8929003a1c18a060309cfd78550d2e3486de7cdfd50132b08ebe4cbfe6b27547f47fe4bdc9b069328ad7eb84de42
-
Filesize
1.2MB
MD5e5cd1317d9e7268609bcdafedb0336c1
SHA13f33f091cecfb85540c0214c002f021a2d83c781
SHA2561f32376904293dccbcd7d85bb1b4da266bf28138e2c9e49ddc4a6aac0d9c5b6e
SHA51217724b3956c41fe9f4eb928eec693980eae879f45a08261c5858161837a9694bece6462cb2c7266c1fb730c707835dab893a22c66958b46d4664a5e2fb58d381
-
Filesize
373KB
MD5601a28eb2d845d729ddd7330cbae6fd6
SHA15cf9f6f9135c903d42a7756c638333db8621e642
SHA2564d43f37576a0ebbaf97024cd5597d968ffe59c871b483554aea302dccb7253f6
SHA5121687044612ceb705f79c806b176f885fd01449251b0097c2df70280b7d10a2b830ee30ac0f645a7e8d8067892f6562d933624de694295e22318863260222859d
-
Filesize
1KB
MD5644ecc38747589057ae5da4fd1c41899
SHA12acac564cd5cb8c89472461f8c5018dfc694659e
SHA256ba3abaf19f026c61b4e30db2cace4746c0a961e77850112e3caef74a65ac10d5
SHA5129009a6d87b20b8473dd4653b25c0d30744af00125b3fb9b83c050e860be122bd705145aac672f12b74573dcb15de6a4ccd5efe9dbda7b1d8966eca4c0f050050