Analysis
-
max time kernel
149s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
4dce2d4fe2054c63b9a870f31a295a3a4f855727508b6da1fe2a2f8a0cbab941.dll
Resource
win7-20240903-en
General
-
Target
4dce2d4fe2054c63b9a870f31a295a3a4f855727508b6da1fe2a2f8a0cbab941.dll
-
Size
908KB
-
MD5
a713d62a74696a69c4f6cee26d0d94c2
-
SHA1
7d37f5b6cb82f71d94ee305e1fccb7879655f830
-
SHA256
4dce2d4fe2054c63b9a870f31a295a3a4f855727508b6da1fe2a2f8a0cbab941
-
SHA512
6e4663dcdc40710e39c9fd2b9ff79fb0a0cb5b3bc48883b9c38c826c3c8d498f0dd0b50785c9a5e6d07af73f68f094f5b3ab25427d61cdf7e9fca016f1d68b30
-
SSDEEP
12288:6qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:6qGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3460-3-0x0000000002BC0000-0x0000000002BC1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/5020-0-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral2/memory/3460-24-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral2/memory/3460-36-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral2/memory/5020-39-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral2/memory/2984-47-0x0000000140000000-0x00000001400E4000-memory.dmp dridex_payload behavioral2/memory/2984-51-0x0000000140000000-0x00000001400E4000-memory.dmp dridex_payload behavioral2/memory/1104-62-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral2/memory/1104-66-0x0000000140000000-0x0000000140129000-memory.dmp dridex_payload behavioral2/memory/4468-81-0x0000000140000000-0x00000001400E4000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
SppExtComObj.ExeProximityUxHost.exewusa.exepid process 2984 SppExtComObj.Exe 1104 ProximityUxHost.exe 4468 wusa.exe -
Loads dropped DLL 3 IoCs
Processes:
SppExtComObj.ExeProximityUxHost.exewusa.exepid process 2984 SppExtComObj.Exe 1104 ProximityUxHost.exe 4468 wusa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzvdnevrdk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\DOCUME~1\\LEJDprm\\PROXIM~1.EXE" -
Processes:
wusa.exerundll32.exeSppExtComObj.ExeProximityUxHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SppExtComObj.Exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ProximityUxHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3460 wrote to memory of 4220 3460 SppExtComObj.Exe PID 3460 wrote to memory of 4220 3460 SppExtComObj.Exe PID 3460 wrote to memory of 2984 3460 SppExtComObj.Exe PID 3460 wrote to memory of 2984 3460 SppExtComObj.Exe PID 3460 wrote to memory of 1828 3460 ProximityUxHost.exe PID 3460 wrote to memory of 1828 3460 ProximityUxHost.exe PID 3460 wrote to memory of 1104 3460 ProximityUxHost.exe PID 3460 wrote to memory of 1104 3460 ProximityUxHost.exe PID 3460 wrote to memory of 1172 3460 wusa.exe PID 3460 wrote to memory of 1172 3460 wusa.exe PID 3460 wrote to memory of 4468 3460 wusa.exe PID 3460 wrote to memory of 4468 3460 wusa.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dce2d4fe2054c63b9a870f31a295a3a4f855727508b6da1fe2a2f8a0cbab941.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
C:\Windows\system32\SppExtComObj.ExeC:\Windows\system32\SppExtComObj.Exe1⤵PID:4220
-
C:\Users\Admin\AppData\Local\0HNK\SppExtComObj.ExeC:\Users\Admin\AppData\Local\0HNK\SppExtComObj.Exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2984
-
C:\Windows\system32\ProximityUxHost.exeC:\Windows\system32\ProximityUxHost.exe1⤵PID:1828
-
C:\Users\Admin\AppData\Local\wDxOalf7E\ProximityUxHost.exeC:\Users\Admin\AppData\Local\wDxOalf7E\ProximityUxHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1104
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:1172
-
C:\Users\Admin\AppData\Local\47R\wusa.exeC:\Users\Admin\AppData\Local\47R\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD5536814e0d7ffcd5a1f091264e3eeccb7
SHA1fdc2e1a9217779ab292c6a1df4e0a0f2133cd8ba
SHA256943cf415ac18a160bc31eee7b2be3bcfee51a4f70420f95abc349a8b93a59ce5
SHA5124842d73e10dd79603c329eb15ae3d7f7f3704fe1f9e9144be8a1188f63b2d02434758c4ea6c74ff798f208cd8ed79e0a7892cc6f8c051f48b22fef140315a1bb
-
Filesize
559KB
MD5728a78909aa69ca0e976e94482350700
SHA16508dfcbf37df25cae8ae68cf1fcd4b78084abb7
SHA2562a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c
SHA51222bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1
-
Filesize
912KB
MD5c99be423a71927d0d4be121489cff4af
SHA108a713ab415745af2a64633c62e1f53aa819b609
SHA256f444ce12ccf205c5491756d199d48f5c811f2ff65027defa33ec0684ff43797e
SHA51291532a0e5475797bf0cdbf69df539606784a7656171557cdf8d042eb87e89746b208f9b4386deb2777a6c0c9baaff6acc8ea9fc5495e35ccc6e4799a5e14410e
-
Filesize
309KB
MD5e43499ee2b4cf328a81bace9b1644c5d
SHA1b2b55641f2799e3fdb3bea709c9532017bbac59d
SHA2563e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb
SHA51204823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b
-
Filesize
1.2MB
MD5bc02fb27ca04bbeb499e061a61f5ae81
SHA17fc71e06baf07104baa14417d4fb4d6f69ff0811
SHA256633a5fca70acf0894b6bdafbb39ac42f6013ad5c93c314f9e26ac19ca0ae36e2
SHA51202fee11e657855dc49babd09aa401f935d5f434f4e8b4a441b66d2f376eedef9d9f538639695dca817f4e0e9fd19ac4d772d320ff0806e65c8fecf11f14bacff
-
Filesize
263KB
MD59ea326415b83d77295c70a35feb75577
SHA1f8fc6a4f7f97b242f35066f61d305e278155b8a8
SHA256192bfde77bf280e48f92d1eceacdc7ec4bf31cda46f7d577c7d7c3ec3ac89d8f
SHA5122b1943600f97abcd18778101e33eac00c2bd360a3eff62fef65f668a084d8fa38c3bbdedfc6c2b7e8410aa7c9c3df2734705dc502b4754259121adc9198c3692
-
Filesize
1KB
MD5fbfaa4a9f0adecbe83af1a9e48f7ba34
SHA167f08a91a067856bb5c63905eb12ee6a20e6e1b7
SHA2562af42309fcd7eebcc1d39c47ffec8750484e8de18d1fb7cba6f7bd0d7bf9f1e1
SHA51234995e8f24571379261eb0e7f6b2a3bc4ecd8064bc33f6437eda90fb5a8eb4fe0f5e7bb669bd4a1a62eed742d6a2b9539288ef0103843a865a5fad375a3814b5