Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
642f7b6daf911406a48014ce3cb624d1980ed73a5ace4439de573ff2791043f9.dll
Resource
win7-20240903-en
General
-
Target
642f7b6daf911406a48014ce3cb624d1980ed73a5ace4439de573ff2791043f9.dll
-
Size
900KB
-
MD5
42b74b886c2d75ff9bf4636e558d7ee2
-
SHA1
096a9d095b93fd378afdc04e04f0d82d23320b3d
-
SHA256
642f7b6daf911406a48014ce3cb624d1980ed73a5ace4439de573ff2791043f9
-
SHA512
688ad13892a5e66726574759fd21579887e2452b54397682a81643735ef050dd4fc4a8d152183802ad7f15f80eb2cdf889aa67a1b9050dcfd813cad00b363c78
-
SSDEEP
12288:CqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed1aaw6:CqGBHTxvt+g2gYed1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1232-4-0x0000000002530000-0x0000000002531000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2676-0-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/1232-23-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/1232-35-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/1232-34-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/2676-43-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/1300-53-0x0000000140000000-0x00000001400E2000-memory.dmp dridex_payload behavioral1/memory/1300-57-0x0000000140000000-0x00000001400E2000-memory.dmp dridex_payload behavioral1/memory/2144-74-0x0000000140000000-0x00000001400E2000-memory.dmp dridex_payload behavioral1/memory/2460-90-0x0000000140000000-0x00000001400E2000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1300 osk.exe 2144 perfmon.exe 2460 BitLockerWizard.exe -
Loads dropped DLL 7 IoCs
pid Process 1232 Process not Found 1300 osk.exe 1232 Process not Found 2144 perfmon.exe 1232 Process not Found 2460 BitLockerWizard.exe 1232 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zoekctxdbskyzr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\TaskBar\\JCG2BR~1\\perfmon.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2676 rundll32.exe 2676 rundll32.exe 2676 rundll32.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2648 1232 Process not Found 30 PID 1232 wrote to memory of 2648 1232 Process not Found 30 PID 1232 wrote to memory of 2648 1232 Process not Found 30 PID 1232 wrote to memory of 1300 1232 Process not Found 31 PID 1232 wrote to memory of 1300 1232 Process not Found 31 PID 1232 wrote to memory of 1300 1232 Process not Found 31 PID 1232 wrote to memory of 2028 1232 Process not Found 32 PID 1232 wrote to memory of 2028 1232 Process not Found 32 PID 1232 wrote to memory of 2028 1232 Process not Found 32 PID 1232 wrote to memory of 2144 1232 Process not Found 33 PID 1232 wrote to memory of 2144 1232 Process not Found 33 PID 1232 wrote to memory of 2144 1232 Process not Found 33 PID 1232 wrote to memory of 1080 1232 Process not Found 34 PID 1232 wrote to memory of 1080 1232 Process not Found 34 PID 1232 wrote to memory of 1080 1232 Process not Found 34 PID 1232 wrote to memory of 2460 1232 Process not Found 35 PID 1232 wrote to memory of 2460 1232 Process not Found 35 PID 1232 wrote to memory of 2460 1232 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\642f7b6daf911406a48014ce3cb624d1980ed73a5ace4439de573ff2791043f9.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵PID:2648
-
C:\Users\Admin\AppData\Local\rFfGP\osk.exeC:\Users\Admin\AppData\Local\rFfGP\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1300
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:2028
-
C:\Users\Admin\AppData\Local\fnikkwy\perfmon.exeC:\Users\Admin\AppData\Local\fnikkwy\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2144
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:1080
-
C:\Users\Admin\AppData\Local\tU4M\BitLockerWizard.exeC:\Users\Admin\AppData\Local\tU4M\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD568a8d17f89fe8a759972bec0f393f6a2
SHA11205341661286c228608d9a71edb9a5982e458e8
SHA2569f3e9c5e690d2717eaa4901ac7a654fcb06be4066b5a4593ee90fba79b8cf9e2
SHA51205c0fcfb7c6ddb04370640fb17291dbb9209f46f1d977d52fe986bba6dffd7fb1f00bad1c9dc17822ca8b9df5c4c77d48d486ed201ba61ebe9b54958cfb5bdfb
-
Filesize
904KB
MD5bc3c2aa85c1515fc114f54ea8760d4a4
SHA1ff7d46654aa115eac18143f229c40a2de1adae3d
SHA256a51e1018be7fc80a7930f58a166b4e8c45e4fbb7789872ca60d3ad7de69cc3b6
SHA512c3117a36c00c567d45d127d42ae2328a7a00d7d84a4474bb4cb52e4d72f1b9e21a22ae900aa965a490c77ee0cffffd7ab9fd84d073bebec003c932f4f7f837df
-
Filesize
1KB
MD50976514544ee78c5fcadcbc8c4a067f3
SHA11337ad15ca96540b9c5ddb638dab2fb1ccab8b97
SHA25673224e22711e2f54c18f71eee8d969ed3dbf0ee59daa2dd47b532ae8f0585bc1
SHA512bf127451b0a294be43f10b00fdde36d078b9c4d65d03e6a9111b270e9106f03f58af2326e757d73b0e7433d979756c6664eb9f262125d2eeea2e009e6bd61359
-
Filesize
904KB
MD578bd391a6dc84e2c9da4c7afed64c4de
SHA1fd362561309b82f8e066245cfaaf4a7eb5109cc6
SHA2563c5a93c93d2b5986f7bd64472c0d8d87de4e17328d0608a076c1f07ee139b922
SHA5129d914d7c047a41248b0394e29f996cdf4e0be571c1cb760906bfeb33a715e61889ab3f1601d829fa3417c308f69134865a6d9486eeb9f7de8672369b6e6c8abe
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
Filesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1
-
Filesize
98KB
MD508a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9