Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
5c75ed616297014a3a602a2dd07ed166a38118dd5288db2998b6ed9d4af46971.dll
Resource
win7-20240903-en
General
-
Target
5c75ed616297014a3a602a2dd07ed166a38118dd5288db2998b6ed9d4af46971.dll
-
Size
696KB
-
MD5
9ddd4fc0449313c0f8928c861e82d59a
-
SHA1
6ac9b2389831ccb8ee2225ab00b4e7a57c60f144
-
SHA256
5c75ed616297014a3a602a2dd07ed166a38118dd5288db2998b6ed9d4af46971
-
SHA512
84be854fad826486d5d39f445b603059d48ecc22be0692607c7747fa45c6ccfa9775854b069ddc72df52241aaec23c8254c63f408f26ada2d3c3fb030bcbc558
-
SSDEEP
12288:+qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baedi1:+qGBHTxvt+g2gYedi1
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3444-3-0x00000000003A0000-0x00000000003A1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/3904-1-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3444-23-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3444-34-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3904-37-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/5096-44-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload behavioral2/memory/5096-49-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload behavioral2/memory/4312-61-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/4312-65-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/964-80-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
LicensingUI.exeBitLockerWizardElev.exerdpinput.exepid process 5096 LicensingUI.exe 4312 BitLockerWizardElev.exe 964 rdpinput.exe -
Loads dropped DLL 3 IoCs
Processes:
LicensingUI.exeBitLockerWizardElev.exerdpinput.exepid process 5096 LicensingUI.exe 4312 BitLockerWizardElev.exe 964 rdpinput.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Labelis = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\BMwIjsYVO\\BitLockerWizardElev.exe" -
Processes:
rundll32.exeLicensingUI.exeBitLockerWizardElev.exerdpinput.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LicensingUI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3904 rundll32.exe 3904 rundll32.exe 3904 rundll32.exe 3904 rundll32.exe 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3444 3444 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3444 wrote to memory of 1756 3444 LicensingUI.exe PID 3444 wrote to memory of 1756 3444 LicensingUI.exe PID 3444 wrote to memory of 5096 3444 LicensingUI.exe PID 3444 wrote to memory of 5096 3444 LicensingUI.exe PID 3444 wrote to memory of 1144 3444 BitLockerWizardElev.exe PID 3444 wrote to memory of 1144 3444 BitLockerWizardElev.exe PID 3444 wrote to memory of 4312 3444 BitLockerWizardElev.exe PID 3444 wrote to memory of 4312 3444 BitLockerWizardElev.exe PID 3444 wrote to memory of 1604 3444 rdpinput.exe PID 3444 wrote to memory of 1604 3444 rdpinput.exe PID 3444 wrote to memory of 964 3444 rdpinput.exe PID 3444 wrote to memory of 964 3444 rdpinput.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c75ed616297014a3a602a2dd07ed166a38118dd5288db2998b6ed9d4af46971.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
C:\Windows\system32\LicensingUI.exeC:\Windows\system32\LicensingUI.exe1⤵PID:1756
-
C:\Users\Admin\AppData\Local\BSZAfTv4u\LicensingUI.exeC:\Users\Admin\AppData\Local\BSZAfTv4u\LicensingUI.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5096
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵PID:1144
-
C:\Users\Admin\AppData\Local\zRc8\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\zRc8\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4312
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵PID:1604
-
C:\Users\Admin\AppData\Local\vzpJC\rdpinput.exeC:\Users\Admin\AppData\Local\vzpJC\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
976KB
MD5cbf2c790b3ea5cd078ea2b147ff76101
SHA153cca03e4b28213cc2c0fba399e1343e827bae10
SHA2565d7420cf1560f1849570415156a9c2515b9b92d7ccfb6caf27e9f0cb3df763d4
SHA51249cf6e72a33c271869be689a8424e37e41793f15a060e04e1a6a560f00a0aeba6c8803a8be21939853b7642e68e0bf67fa6db8edc638cff7d3d994c92b5ca2ca
-
Filesize
142KB
MD58b4abc637473c79a003d30bb9c7a05e5
SHA1d1cab953c16d4fdec2b53262f56ac14a914558ca
SHA2560e9eb89aa0df9bb84a8f11b0bb3e9d89905355de34c91508968b4cb78bc3f6c5
SHA5125a40c846c5b3a53ae09114709239d8238c322a7d3758b20ed3fc8e097fc1409f62b4990557c1192e894eabfa89741a9d88bd5175850d039b97dfdf380d1c6eeb
-
Filesize
700KB
MD50ad28fe23894c533a2e310307dc47243
SHA1a45d16bf337ef3d109ac40db9dcd33ec62412f66
SHA256b6d7467236f42bdcaddee68b9da6fef40dfb814365ef8d5fa02c8403f53aec35
SHA5121a9d0aad5734de75204bcfd2fc1caf4bec1e8c36d0c569733ff37452f3fbfddfcc615392499d75f85723ea8f801e76fb4218d6807bda081b9601bec213820c3b
-
Filesize
180KB
MD5bd99eeca92869f9a3084d689f335c734
SHA1a2839f6038ea50a4456cd5c2a3ea003e7b77688c
SHA25639bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143
SHA512355433c3bbbaa3bcb849633d45713d8a7ac6f87a025732fbe83e259ec3a0cb4eabb18239df26609453f9fc6764c7276c5d0472f11cf12d15ef806aa7594d090e
-
Filesize
100KB
MD58ac5a3a20cf18ae2308c64fd707eeb81
SHA131f2f0bdc2eb3e0d2a6cd626ea8ed71262865544
SHA256803eb37617d450704766cb167dc9766e82102a94940a26a988ad26ab8be3f2f5
SHA51285d0e28e4bffec709f26b2f0d20eb76373134af43bcaa70b97a03efa273b77dd4fbd4f6ee026774ce4029ab5a983aea057111efcd234ab1686a9bd0f7202748b
-
Filesize
700KB
MD54f1868498d74f22b19bf335fdd6086f4
SHA1bb83ca03c9483d3af841e2bde814a2404c3e1590
SHA256fe93ac77883683c5902a29695c0626d7e91316df02cc25cce1efbb277b37902b
SHA51290ae5a7c107699a3a521011a7ca2e550852ef31d35d565c2125141465d2ab95ffa2af827f434a34ae48509a3b82c58d9a520f36f2a3481e5fa391a97005bd29f
-
Filesize
1KB
MD54142db5b8979c8ae21f04c3845dad58f
SHA162bc45bb9c0a67e1bddd041df80cc77bcc8cb685
SHA2565d8598d6e605983de599d30cd81eb87d9b4a9f10fc497a33624c033386c3ccc5
SHA5127eefc0a300acc0cc96f1461b350e58bd873814961c51a8ff97cb01fa43998c7083c7e2738cc79c89a32f09ff8fc6d9e6c183ab839f8ff218b22d8332e7c125d2