Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
5610f2cff2a5352f2aea2e2d85f83d8dd8d44bc56b776a938ef4826f621adcc7.dll
Resource
win7-20241010-en
General
-
Target
5610f2cff2a5352f2aea2e2d85f83d8dd8d44bc56b776a938ef4826f621adcc7.dll
-
Size
700KB
-
MD5
f361ea6f535b8b1dfbfe86aea88cc345
-
SHA1
43d2f136fbf4fe3918efcc246de89783158bd17b
-
SHA256
5610f2cff2a5352f2aea2e2d85f83d8dd8d44bc56b776a938ef4826f621adcc7
-
SHA512
476b50c70ef7d07a5cb77413824783bc3ae00c1df5e8bb0cd4d6482eec8087121fbaa3fe1a4f47f20422d655699493baaef14ee9b93bd091c0ac625481d0ae59
-
SSDEEP
12288:RqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:RqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1188-4-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2956-0-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1188-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1188-35-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1188-36-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2956-44-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1616-53-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/1616-58-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2092-75-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2844-91-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
osk.exeicardagt.exerstrui.exepid process 1616 osk.exe 2092 icardagt.exe 2844 rstrui.exe -
Loads dropped DLL 7 IoCs
Processes:
osk.exeicardagt.exerstrui.exepid process 1188 1616 osk.exe 1188 2092 icardagt.exe 1188 2844 rstrui.exe 1188 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uuyszikihxbb = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ADMINI~1\\30\\icardagt.exe" -
Processes:
rundll32.exeosk.exeicardagt.exerstrui.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2956 rundll32.exe 2956 rundll32.exe 2956 rundll32.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1188 wrote to memory of 2672 1188 osk.exe PID 1188 wrote to memory of 2672 1188 osk.exe PID 1188 wrote to memory of 2672 1188 osk.exe PID 1188 wrote to memory of 1616 1188 osk.exe PID 1188 wrote to memory of 1616 1188 osk.exe PID 1188 wrote to memory of 1616 1188 osk.exe PID 1188 wrote to memory of 1200 1188 icardagt.exe PID 1188 wrote to memory of 1200 1188 icardagt.exe PID 1188 wrote to memory of 1200 1188 icardagt.exe PID 1188 wrote to memory of 2092 1188 icardagt.exe PID 1188 wrote to memory of 2092 1188 icardagt.exe PID 1188 wrote to memory of 2092 1188 icardagt.exe PID 1188 wrote to memory of 2292 1188 rstrui.exe PID 1188 wrote to memory of 2292 1188 rstrui.exe PID 1188 wrote to memory of 2292 1188 rstrui.exe PID 1188 wrote to memory of 2844 1188 rstrui.exe PID 1188 wrote to memory of 2844 1188 rstrui.exe PID 1188 wrote to memory of 2844 1188 rstrui.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5610f2cff2a5352f2aea2e2d85f83d8dd8d44bc56b776a938ef4826f621adcc7.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵PID:2672
-
C:\Users\Admin\AppData\Local\LFxS201\osk.exeC:\Users\Admin\AppData\Local\LFxS201\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1616
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵PID:1200
-
C:\Users\Admin\AppData\Local\3wVLSA1\icardagt.exeC:\Users\Admin\AppData\Local\3wVLSA1\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2092
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:2292
-
C:\Users\Admin\AppData\Local\NIznXP9\rstrui.exeC:\Users\Admin\AppData\Local\NIznXP9\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5341ebd071eb3068538d5f0245c056cfb
SHA110e65fb14092e76d28c01653204d5ad4a1def66d
SHA25659e37b75c83a3be3a1086d0706cf45401b6ad8047cedc2532e1121416f3ccc84
SHA5127941ce3519c990e8cb99995c2647958f292596ee1151ee625d0d084d56d0955c243f904973b889b86b9517ddb34c1d6c7cfbd7330952e3c0df4d37c72e8e3ed4
-
Filesize
1.3MB
MD52fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
Filesize
704KB
MD53692bc17a9aa1b45901724d82868a542
SHA16f884cb64d8303e12b7c200b8bb700b2488a916e
SHA25629caacd9285ca97a86b684ad73137d1c53e27799dc7f53693464dbaa7789c1eb
SHA512a055d5d1a87da6861f9881d296f81eb3a0cc55c53ee3c1f1ebe36eb9d9ff02b66aa4bd7cc4ebb9ea4e2a953776382a69afd9ccd151c95944f876d5093cb7988f
-
Filesize
1KB
MD5a40d704489bfe2bfe7007fc75daddd8e
SHA1d6e495015e8b324c4d94ed7e06f644fe67e8e356
SHA25654424c160febcc1ea910d3e4688914d7865705166c48fcd5671af8e996a1e187
SHA51209765a089232e07066926bd59dbadb6348b6bbadad27a84dfba62a73152232c95cbf4e6c872974d7b3971027d0eedac793a48beb8bcb7836e17cd89c21b20b48
-
Filesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1
-
Filesize
704KB
MD5b789568e3fffc51d215ef43475a7d815
SHA193a5bc3c0692c07efae98cee6fce35671c2272aa
SHA256171b96c496e1749e6955130d45600bc063c70be4eaf256dbda765d690c798bc5
SHA512ebfb02b0f50f62bc4357eb2b2dc34ac7b8b11e56e93fd78933b853d4a3c5e911bd3b11acb275f7be82c4449143af8ca98afffe9e23ecbd31eee2069f96264ade
-
Filesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025