Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
642f7b6daf911406a48014ce3cb624d1980ed73a5ace4439de573ff2791043f9.dll
Resource
win7-20240903-en
General
-
Target
642f7b6daf911406a48014ce3cb624d1980ed73a5ace4439de573ff2791043f9.dll
-
Size
900KB
-
MD5
42b74b886c2d75ff9bf4636e558d7ee2
-
SHA1
096a9d095b93fd378afdc04e04f0d82d23320b3d
-
SHA256
642f7b6daf911406a48014ce3cb624d1980ed73a5ace4439de573ff2791043f9
-
SHA512
688ad13892a5e66726574759fd21579887e2452b54397682a81643735ef050dd4fc4a8d152183802ad7f15f80eb2cdf889aa67a1b9050dcfd813cad00b363c78
-
SSDEEP
12288:CqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed1aaw6:CqGBHTxvt+g2gYed1
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1216-4-0x00000000025F0000-0x00000000025F1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2516-1-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/1216-23-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/1216-34-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/1216-35-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/2516-43-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/2916-53-0x0000000140000000-0x00000001400E2000-memory.dmp dridex_payload behavioral1/memory/2916-57-0x0000000140000000-0x00000001400E2000-memory.dmp dridex_payload behavioral1/memory/3044-74-0x0000000140000000-0x00000001400E2000-memory.dmp dridex_payload behavioral1/memory/584-86-0x0000000140000000-0x0000000140115000-memory.dmp dridex_payload behavioral1/memory/584-90-0x0000000140000000-0x0000000140115000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
psr.exeSystemPropertiesPerformance.exeUtilman.exepid process 2916 psr.exe 3044 SystemPropertiesPerformance.exe 584 Utilman.exe -
Loads dropped DLL 7 IoCs
Processes:
psr.exeSystemPropertiesPerformance.exeUtilman.exepid process 1216 2916 psr.exe 1216 3044 SystemPropertiesPerformance.exe 1216 584 Utilman.exe 1216 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rtunysabu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\AddIns\\iQC9m\\SystemPropertiesPerformance.exe" -
Processes:
rundll32.exepsr.exeSystemPropertiesPerformance.exeUtilman.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1216 wrote to memory of 2892 1216 psr.exe PID 1216 wrote to memory of 2892 1216 psr.exe PID 1216 wrote to memory of 2892 1216 psr.exe PID 1216 wrote to memory of 2916 1216 psr.exe PID 1216 wrote to memory of 2916 1216 psr.exe PID 1216 wrote to memory of 2916 1216 psr.exe PID 1216 wrote to memory of 2332 1216 SystemPropertiesPerformance.exe PID 1216 wrote to memory of 2332 1216 SystemPropertiesPerformance.exe PID 1216 wrote to memory of 2332 1216 SystemPropertiesPerformance.exe PID 1216 wrote to memory of 3044 1216 SystemPropertiesPerformance.exe PID 1216 wrote to memory of 3044 1216 SystemPropertiesPerformance.exe PID 1216 wrote to memory of 3044 1216 SystemPropertiesPerformance.exe PID 1216 wrote to memory of 1740 1216 Utilman.exe PID 1216 wrote to memory of 1740 1216 Utilman.exe PID 1216 wrote to memory of 1740 1216 Utilman.exe PID 1216 wrote to memory of 584 1216 Utilman.exe PID 1216 wrote to memory of 584 1216 Utilman.exe PID 1216 wrote to memory of 584 1216 Utilman.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\642f7b6daf911406a48014ce3cb624d1980ed73a5ace4439de573ff2791043f9.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2892
-
C:\Users\Admin\AppData\Local\Ap4gkf\psr.exeC:\Users\Admin\AppData\Local\Ap4gkf\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2916
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:2332
-
C:\Users\Admin\AppData\Local\egmWm2cV\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\egmWm2cV\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3044
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵PID:1740
-
C:\Users\Admin\AppData\Local\ebf\Utilman.exeC:\Users\Admin\AppData\Local\ebf\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD5f20a6166eef6b6217ba5146269b2e62a
SHA1a363c5bfe1fab345f361a415e37a2a0e1413612f
SHA2564c1d9105301f8f15e97467a72e6ad63d30380cdeb18f62bb4f8cd2986c563591
SHA512784ae42318f6c5bb5e43756b242cd52c5403d0fbf046c735b4b431fc5689bfb63ece232ad489f6dbe388ab6109b5227646998c9809a22eca1f22842a8d587a15
-
Filesize
1.1MB
MD5d9a871440e7f65a47b2f4f4007cfe6d2
SHA10bef5434f2763147a45acdb976e8eba2be60825c
SHA256736d53f14b97ad354e045a955e1c5b5337dfa1a4556a5ba517675838e78f772c
SHA5129dd774db766665e32bac51240d51fd2b85a5b561d4ab6e0feeebd3e56bcaf6f489f5e5844c34b729e9ce36bfa86c090cc0596dfdba1c19a52976812a65c57544
-
Filesize
1.3MB
MD532c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
Filesize
904KB
MD5ebe60483acfe41bdf3176d0b8c518e8b
SHA1a91b61c08e3dfc2a543d2401ac94f739034a755a
SHA25636ec9d6df0f3d326268ddeaf81d0690f5fb771d87061be09faf283e166b372ab
SHA5127957ac648c60f860ec1839c6b292486e7cfca13b4a785a562f638edd6ba5d81f2af3fe84c596a6f510ff2ac1a32e9a721bdde86f673fd8e814620289bfe8ad3b
-
Filesize
735B
MD5489eace4903f10581ecec54760993bb8
SHA1794897a8591aa00f79922f7f231c83aa29680544
SHA25655f4d7c9f70a6f5518201d1e3564a242e7b1ab59592011a2fe4d43975c003970
SHA512b70a19c6a1c82bc156b0bfc4d24c43041011b643d10b4b617c1a47cbbde1442f2017aaeb3066fdf0587b2991c01a1387629cc1fbf6413664c342f7ead821472c
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
80KB
MD5870726cdcc241a92785572628b89cc07
SHA163d47cc4fe9beb75862add1abca1d8ae8235710a
SHA2561ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6
SHA51289b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72