Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
6148532826cdbfc9b12295ce641021f22336459ea6f5cd2de43dec5f18e648bf.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6148532826cdbfc9b12295ce641021f22336459ea6f5cd2de43dec5f18e648bf.dll
Resource
win10v2004-20241007-en
General
-
Target
6148532826cdbfc9b12295ce641021f22336459ea6f5cd2de43dec5f18e648bf.dll
-
Size
728KB
-
MD5
3a325295832f70c883b27b87efa606c6
-
SHA1
920e9216016a61f1323024604facdb3fa3d4739a
-
SHA256
6148532826cdbfc9b12295ce641021f22336459ea6f5cd2de43dec5f18e648bf
-
SHA512
8908496ecd06be35afaf723601ec8478f8b6d1805bf390f5fbb2301db21d0872b0b63f4dbdfb1f9d03db8ecd721a697a49a6eb79d6d5d3e2f173e3176cc7c05f
-
SSDEEP
12288:pqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:pqGBHTxvt+g2gYed
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3504-4-0x0000000002D10000-0x0000000002D11000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/840-1-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/3504-35-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/3504-24-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/840-38-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/996-45-0x0000000140000000-0x00000001400FC000-memory.dmp dridex_payload behavioral2/memory/996-50-0x0000000140000000-0x00000001400FC000-memory.dmp dridex_payload behavioral2/memory/4820-63-0x0000022F3A900000-0x0000022F3A9B7000-memory.dmp dridex_payload behavioral2/memory/4820-67-0x0000022F3A900000-0x0000022F3A9B7000-memory.dmp dridex_payload behavioral2/memory/2060-78-0x0000000140000000-0x00000001400B7000-memory.dmp dridex_payload behavioral2/memory/2060-81-0x0000000140000000-0x00000001400B7000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 996 wlrmdr.exe 4820 ie4uinit.exe 2060 Magnify.exe -
Loads dropped DLL 4 IoCs
pid Process 996 wlrmdr.exe 4820 ie4uinit.exe 4820 ie4uinit.exe 2060 Magnify.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sarxmtvezib = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\MRy2bkAPELS\\ie4uinit.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wlrmdr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4uinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 840 rundll32.exe 840 rundll32.exe 840 rundll32.exe 840 rundll32.exe 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3504 wrote to memory of 5116 3504 Process not Found 94 PID 3504 wrote to memory of 5116 3504 Process not Found 94 PID 3504 wrote to memory of 996 3504 Process not Found 95 PID 3504 wrote to memory of 996 3504 Process not Found 95 PID 3504 wrote to memory of 4876 3504 Process not Found 96 PID 3504 wrote to memory of 4876 3504 Process not Found 96 PID 3504 wrote to memory of 4820 3504 Process not Found 97 PID 3504 wrote to memory of 4820 3504 Process not Found 97 PID 3504 wrote to memory of 1624 3504 Process not Found 98 PID 3504 wrote to memory of 1624 3504 Process not Found 98 PID 3504 wrote to memory of 2060 3504 Process not Found 99 PID 3504 wrote to memory of 2060 3504 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6148532826cdbfc9b12295ce641021f22336459ea6f5cd2de43dec5f18e648bf.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:840
-
C:\Windows\system32\wlrmdr.exeC:\Windows\system32\wlrmdr.exe1⤵PID:5116
-
C:\Users\Admin\AppData\Local\cDM6QV\wlrmdr.exeC:\Users\Admin\AppData\Local\cDM6QV\wlrmdr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:996
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵PID:4876
-
C:\Users\Admin\AppData\Local\JKIQO\ie4uinit.exeC:\Users\Admin\AppData\Local\JKIQO\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4820
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:1624
-
C:\Users\Admin\AppData\Local\ooXgo\Magnify.exeC:\Users\Admin\AppData\Local\ooXgo\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2060
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
732KB
MD59a0da427a987e099237b30a3dc925ec3
SHA1c999f0bd7fcfd9fa489908d24e466bcd7fb30b36
SHA256d6d4c935787457f33275f028490d6d315beafb7468c34fa36a7b16aa7cd0c37b
SHA51265260de053928082cd50ef54b18cd7d8c8f26fed4b058d1482195678713cbe94d70742dba3d89e528beac2aea7c7a5ccd575eb1c1237a0c1dd5cce53730433d9
-
Filesize
262KB
MD5a2f0104edd80ca2c24c24356d5eacc4f
SHA18269b9fd9231f04ed47419bd565c69dc677fab56
SHA2565d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c
SHA512e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390
-
Filesize
1008KB
MD56e021ed743f9c3d7446598a2a2d7d1d8
SHA1ab202fdf59ccb46537ad2ada7505b3350d86e80a
SHA256cce7da790fb486f5999db7428f1055161ecede2c917f9f7d7c718ec17c75e1af
SHA5121094341b6c180f704f942ac3bfd5cdb16b0a5d33f09813e79544365cc5d0f896aa71318c93793353758ea7ae31ff568ef6a535ed3aecd53245c7f91d555960de
-
Filesize
66KB
MD5ef9bba7a637a11b224a90bf90a8943ac
SHA14747ec6efd2d41e049159249c2d888189bb33d1d
SHA2562fda95aafb2e9284c730bf912b93f60a75b151941adc14445ed1e056140325b1
SHA5124c1fdb8e4bf25546a2a33c95268593746f5ae2666ce36c6d9ba5833357f13720c4722231224e82308af8c156485a2c86ffd97e3093717a28d1300d3787ef1831
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
732KB
MD549e5bb7a787643791be29e35c7e1b612
SHA1690fe3951233ea615b997bb38bed8e559b0c077f
SHA256e4cbd2983d53290ddd1fa7fe18d7eb77fa03376c6fc5672df63d700ace6331b6
SHA5124225a5727052eaa64d1790f4ef4f382582764a0b44c18a9313272c8a613f0c2b34244cd6f9eaaeab9c6de3395609c8cd9d4910f0947fdafbbbe5f850b6207ebe
-
Filesize
1KB
MD565b1f3957f2beb70b81c7529db333a51
SHA1caf6b3da1a16a277b533272f49fe1f39e830367d
SHA25677250d83757f3aac3cae7f54d2e52d45f6386b6ad33d37527d6e4f41b12eff79
SHA512dd2b9a32bfa91ebd47228dc9935d8d1b845babb61ade1bb7a7542dfd5c4fb8d7a65afb34b4c58098fb77dfbbd145ffdaa930aa0ebcb3bc350dcaa91e95e50314