Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
4dce2d4fe2054c63b9a870f31a295a3a4f855727508b6da1fe2a2f8a0cbab941.dll
Resource
win7-20240903-en
General
-
Target
4dce2d4fe2054c63b9a870f31a295a3a4f855727508b6da1fe2a2f8a0cbab941.dll
-
Size
908KB
-
MD5
a713d62a74696a69c4f6cee26d0d94c2
-
SHA1
7d37f5b6cb82f71d94ee305e1fccb7879655f830
-
SHA256
4dce2d4fe2054c63b9a870f31a295a3a4f855727508b6da1fe2a2f8a0cbab941
-
SHA512
6e4663dcdc40710e39c9fd2b9ff79fb0a0cb5b3bc48883b9c38c826c3c8d498f0dd0b50785c9a5e6d07af73f68f094f5b3ab25427d61cdf7e9fca016f1d68b30
-
SSDEEP
12288:6qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:6qGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-4-0x0000000002890000-0x0000000002891000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1812-1-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/1204-24-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/1204-36-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/1204-37-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/1812-45-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/2700-54-0x0000000140000000-0x00000001400E5000-memory.dmp dridex_payload behavioral1/memory/2700-59-0x0000000140000000-0x00000001400E5000-memory.dmp dridex_payload behavioral1/memory/2832-71-0x0000000140000000-0x0000000140117000-memory.dmp dridex_payload behavioral1/memory/2832-75-0x0000000140000000-0x0000000140117000-memory.dmp dridex_payload behavioral1/memory/2392-85-0x0000000140000000-0x00000001400E4000-memory.dmp dridex_payload behavioral1/memory/2392-89-0x0000000140000000-0x00000001400E4000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
consent.exeMagnify.exeSndVol.exepid process 2700 consent.exe 2832 Magnify.exe 2392 SndVol.exe -
Loads dropped DLL 7 IoCs
Processes:
consent.exeMagnify.exeSndVol.exepid process 1204 2700 consent.exe 1204 2832 Magnify.exe 1204 2392 SndVol.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\ASSETC~1\\3X4ZXP4S\\OXIALM~1\\Magnify.exe" -
Processes:
rundll32.execonsent.exeMagnify.exeSndVol.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA consent.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.execonsent.exepid process 1812 rundll32.exe 1812 rundll32.exe 1812 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 2700 consent.exe 2700 consent.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2772 1204 consent.exe PID 1204 wrote to memory of 2772 1204 consent.exe PID 1204 wrote to memory of 2772 1204 consent.exe PID 1204 wrote to memory of 2700 1204 consent.exe PID 1204 wrote to memory of 2700 1204 consent.exe PID 1204 wrote to memory of 2700 1204 consent.exe PID 1204 wrote to memory of 2688 1204 Magnify.exe PID 1204 wrote to memory of 2688 1204 Magnify.exe PID 1204 wrote to memory of 2688 1204 Magnify.exe PID 1204 wrote to memory of 2832 1204 Magnify.exe PID 1204 wrote to memory of 2832 1204 Magnify.exe PID 1204 wrote to memory of 2832 1204 Magnify.exe PID 1204 wrote to memory of 2296 1204 SndVol.exe PID 1204 wrote to memory of 2296 1204 SndVol.exe PID 1204 wrote to memory of 2296 1204 SndVol.exe PID 1204 wrote to memory of 2392 1204 SndVol.exe PID 1204 wrote to memory of 2392 1204 SndVol.exe PID 1204 wrote to memory of 2392 1204 SndVol.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dce2d4fe2054c63b9a870f31a295a3a4f855727508b6da1fe2a2f8a0cbab941.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:2772
-
C:\Users\Admin\AppData\Local\2YVj\consent.exeC:\Users\Admin\AppData\Local\2YVj\consent.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:2688
-
C:\Users\Admin\AppData\Local\5tWuMl\Magnify.exeC:\Users\Admin\AppData\Local\5tWuMl\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2832
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:2296
-
C:\Users\Admin\AppData\Local\8qQ7Ecwy3\SndVol.exeC:\Users\Admin\AppData\Local\8qQ7Ecwy3\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916KB
MD5f5e37afb587c147f5ff68bc848ef6f91
SHA1d02eb51e1feeb5754daa6962e3d91cf383c2f951
SHA2566e8c5c39ffcc089de180d341bb522328c106c5510180fb8cc2e50e735a430ca8
SHA512bfac625a52c0b41af6c65779c44f1b7507b9111b87e3ec9730efc26f3c43179acb8162a0e1c32ee07eebc5e1afa918977ed6ab3a043d6ba3c0e1c9d3e31246e8
-
Filesize
1.1MB
MD55ccf7049b6d46f8ba21efc0039e65719
SHA1c8205f4a0cb6ba529691396fe294cc14a8fe9720
SHA256f81d350699ab9fefbbcbaf0feabff390074407a362ecdd1ab1b466d092e0934d
SHA512b11415008714781fbcedef05dec9e95b74013cf563c93beab9317b50532831f9f500a2412f85d0fc1b338878abdf6420f61a21cd2938ad796d0c0d4c0cb86568
-
Filesize
912KB
MD52d83239b0626b1525c07cf43e14f7ad9
SHA1bb511af989f2ef3021f2cafb693cf32dc9424d48
SHA256f5e17071c2eb1c1fac68bad1ca098ffdf6aba8236ee976e23d55cc2e3910a698
SHA512e354b899096db0cde195f8b45274019988dfe37e85cdadad2d6312a808a81ad7267e8f7eaa358bb548b17ff2cfcce1e4e08f8849fd97003be06756a50cd0d290
-
Filesize
1KB
MD5fc614c07cc558407871c8a46900ff7b4
SHA1a174a12810bc34d54efdb6a19ae76d3fe25d0dbe
SHA25675d7d996967ae73b58c63717acfdd8efd9e001dd6c07a3316b7083b0684820f5
SHA512a90e328ed9e518e7d8843c1bd24058d980c068d78475e1779ab96652adcbc20c165ab80068a6233fca31027c1fddb0741dc48aee2d8a259608a572f97c0f42b8
-
Filesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7
-
Filesize
637KB
MD5233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9