Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
4045c8c25b01a13d4ddb043efc4b03c5cf9d59fd5a85eb8403576fabf992af7d.dll
Resource
win7-20241010-en
General
-
Target
4045c8c25b01a13d4ddb043efc4b03c5cf9d59fd5a85eb8403576fabf992af7d.dll
-
Size
1.2MB
-
MD5
a85440e55b4cbf0624dff9e908308693
-
SHA1
acd4bdee53cd2d77cfc312ec032c0cb5ff97dfbe
-
SHA256
4045c8c25b01a13d4ddb043efc4b03c5cf9d59fd5a85eb8403576fabf992af7d
-
SHA512
53a240857da2b0707d09a534ae69e26ea59ae831b21c195e99b312f550263df59f04c951bab053e954baeb90de50067ec8f662dc74df9455f8984feda365f21d
-
SSDEEP
12288:qqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baedh:qqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1212-4-0x0000000002B30000-0x0000000002B31000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1736-1-0x0000000140000000-0x0000000140127000-memory.dmp dridex_payload behavioral1/memory/1212-24-0x0000000140000000-0x0000000140127000-memory.dmp dridex_payload behavioral1/memory/1212-35-0x0000000140000000-0x0000000140127000-memory.dmp dridex_payload behavioral1/memory/1212-37-0x0000000140000000-0x0000000140127000-memory.dmp dridex_payload behavioral1/memory/1736-44-0x0000000140000000-0x0000000140127000-memory.dmp dridex_payload behavioral1/memory/2876-55-0x0000000140000000-0x0000000140128000-memory.dmp dridex_payload behavioral1/memory/2876-58-0x0000000140000000-0x0000000140128000-memory.dmp dridex_payload behavioral1/memory/1316-76-0x0000000140000000-0x0000000140128000-memory.dmp dridex_payload behavioral1/memory/2996-90-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral1/memory/2996-94-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
rstrui.exewextract.exerrinstaller.exepid process 2876 rstrui.exe 1316 wextract.exe 2996 rrinstaller.exe -
Loads dropped DLL 7 IoCs
Processes:
rstrui.exewextract.exerrinstaller.exepid process 1212 2876 rstrui.exe 1212 1316 wextract.exe 1212 2996 rrinstaller.exe 1212 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kgvptlq = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\EZ1BCR~1\\wextract.exe" -
Processes:
rundll32.exerstrui.exewextract.exerrinstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1212 wrote to memory of 2944 1212 rstrui.exe PID 1212 wrote to memory of 2944 1212 rstrui.exe PID 1212 wrote to memory of 2944 1212 rstrui.exe PID 1212 wrote to memory of 2876 1212 rstrui.exe PID 1212 wrote to memory of 2876 1212 rstrui.exe PID 1212 wrote to memory of 2876 1212 rstrui.exe PID 1212 wrote to memory of 1944 1212 wextract.exe PID 1212 wrote to memory of 1944 1212 wextract.exe PID 1212 wrote to memory of 1944 1212 wextract.exe PID 1212 wrote to memory of 1316 1212 wextract.exe PID 1212 wrote to memory of 1316 1212 wextract.exe PID 1212 wrote to memory of 1316 1212 wextract.exe PID 1212 wrote to memory of 3056 1212 rrinstaller.exe PID 1212 wrote to memory of 3056 1212 rrinstaller.exe PID 1212 wrote to memory of 3056 1212 rrinstaller.exe PID 1212 wrote to memory of 2996 1212 rrinstaller.exe PID 1212 wrote to memory of 2996 1212 rrinstaller.exe PID 1212 wrote to memory of 2996 1212 rrinstaller.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4045c8c25b01a13d4ddb043efc4b03c5cf9d59fd5a85eb8403576fabf992af7d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:2944
-
C:\Users\Admin\AppData\Local\VWQ4QRIO\rstrui.exeC:\Users\Admin\AppData\Local\VWQ4QRIO\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2876
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵PID:1944
-
C:\Users\Admin\AppData\Local\cTTGKIGy\wextract.exeC:\Users\Admin\AppData\Local\cTTGKIGy\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1316
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:3056
-
C:\Users\Admin\AppData\Local\4MHPuPBW\rrinstaller.exeC:\Users\Admin\AppData\Local\4MHPuPBW\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a0a07cf112d04b24c2e00f3076018c19
SHA17e09b836e17900c457edb5b6b4e13134c7d36c83
SHA256eba4e894e82835ee69e389b3f764631664cbad78c13daab54ce521fe91917863
SHA512e6acdabd395bfcf598ba7daaeb2a012abaf87523aa28cb0aed43c50489016a07bb7c5b2c56b04c414fe15d96c56a5c5b29034a27bb5c1e6c59aea63458cbf431
-
Filesize
1.2MB
MD5cf9131f1571b041efc6343b4ed878650
SHA139428e40123ac65f2da888900ec238e89ee85d32
SHA2564f96e85476d26e9464e0bb3e51fb7739ebe0b693215cad60a82c4022efb2e73e
SHA51222597fbbcd39e522f7398ad390063ca115242695767c8ffcb660903435552dcbb3395a70e1801be6304d15214ea52cb0887f0956e0b2853179abc3b66917b509
-
Filesize
1.2MB
MD56e1013d1c5bea0210efc221f6af8c417
SHA1e99923611136228ca639e16c74c7c892b8a7cb16
SHA256050e9376cff3865c76d2186ed5b7347f8db1f5a45cb851084f382baca7ccdc66
SHA5123b7ffaf94dc3572daa7610e9e64e2d7f3c0050267a9f3d5974960a1a24b002bd793c021fbeb591ef9d75fc9ba3b3111ca880583cf54451dc7994dd3741157fcb
-
Filesize
1KB
MD5e6b303b20d039c90a2f8d62a24c5eb6c
SHA1d4389dbecea3b67c481e80ee419a559fc9052bc5
SHA256238fcb581c4891710f33c35f9698ad733ffbdf4c11024991a3ea0c1f4e24b663
SHA512434976fe3838db881f441a1803b18037c35eca5c88cf08e1df765f775f31f9b9965ebfd8cb5349853b9d9d38d6830f6e5a8113a3411abd59fc15ea356db77636
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
Filesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
Filesize
140KB
MD51ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb