Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
6dbd1df5459b17bb2c9fdb7849e4294657404971ac6495660b29464e4a69e176.dll
Resource
win7-20240903-en
General
-
Target
6dbd1df5459b17bb2c9fdb7849e4294657404971ac6495660b29464e4a69e176.dll
-
Size
724KB
-
MD5
6a6345e39d25621d971721a635aa86e5
-
SHA1
36c3b301d60b34ebe4b206e1660d496f991a9a1d
-
SHA256
6dbd1df5459b17bb2c9fdb7849e4294657404971ac6495660b29464e4a69e176
-
SHA512
1b7cfcb8d052928407cc38126c7001140ed77f07c2162ef79128fef40bc3aea42b38ede6412b9c60e361a6a29cabdcc43d38cdbd83b5191d63d0296f3dde22ee
-
SSDEEP
12288:JqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:JqGBHTxvt+g2gYed
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3520-4-0x00000000033A0000-0x00000000033A1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/788-1-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/3520-24-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/3520-35-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/788-38-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/1980-45-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/1980-50-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/3560-61-0x0000000140000000-0x00000001400B7000-memory.dmp dridex_payload behavioral2/memory/3560-66-0x0000000140000000-0x00000001400B7000-memory.dmp dridex_payload behavioral2/memory/3160-77-0x0000000140000000-0x00000001400FB000-memory.dmp dridex_payload behavioral2/memory/3160-81-0x0000000140000000-0x00000001400FB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1980 SystemSettingsAdminFlows.exe 3560 dccw.exe 3160 dpapimig.exe -
Loads dropped DLL 3 IoCs
pid Process 1980 SystemSettingsAdminFlows.exe 3560 dccw.exe 3160 dpapimig.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gbrhc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\UgY1EMqvLPq\\dccw.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsAdminFlows.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 788 rundll32.exe 788 rundll32.exe 788 rundll32.exe 788 rundll32.exe 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found Token: SeShutdownPrivilege 3520 Process not Found Token: SeCreatePagefilePrivilege 3520 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3520 Process not Found 3520 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4832 3520 Process not Found 99 PID 3520 wrote to memory of 4832 3520 Process not Found 99 PID 3520 wrote to memory of 1980 3520 Process not Found 100 PID 3520 wrote to memory of 1980 3520 Process not Found 100 PID 3520 wrote to memory of 2044 3520 Process not Found 101 PID 3520 wrote to memory of 2044 3520 Process not Found 101 PID 3520 wrote to memory of 3560 3520 Process not Found 102 PID 3520 wrote to memory of 3560 3520 Process not Found 102 PID 3520 wrote to memory of 3172 3520 Process not Found 103 PID 3520 wrote to memory of 3172 3520 Process not Found 103 PID 3520 wrote to memory of 3160 3520 Process not Found 104 PID 3520 wrote to memory of 3160 3520 Process not Found 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6dbd1df5459b17bb2c9fdb7849e4294657404971ac6495660b29464e4a69e176.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:788
-
C:\Windows\system32\SystemSettingsAdminFlows.exeC:\Windows\system32\SystemSettingsAdminFlows.exe1⤵PID:4832
-
C:\Users\Admin\AppData\Local\0E34Ki\SystemSettingsAdminFlows.exeC:\Users\Admin\AppData\Local\0E34Ki\SystemSettingsAdminFlows.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1980
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵PID:2044
-
C:\Users\Admin\AppData\Local\CT6asCOLO\dccw.exeC:\Users\Admin\AppData\Local\CT6asCOLO\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3560
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:3172
-
C:\Users\Admin\AppData\Local\N7G7\dpapimig.exeC:\Users\Admin\AppData\Local\N7G7\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD550adb2c7c145c729b9de8b7cf967dd24
SHA1a31757f08da6f95156777c1132b6d5f1db3d8f30
SHA256a7a2e7122d27308df37b7ab718ef3ac239e4216669f51331e34e205f59fb0aec
SHA512715b4c93e79e896da1cf86cf4455a84cba1aeac34b6fd72d2afdf203a2034f6f8fac1d6501f0dd277a17bd1d7ab73ddd1887e01a99f2d26f39efeb94d0aac9b0
-
Filesize
728KB
MD5a8d323ed76acf6f6ce35ff0cac761b52
SHA15feffacf2c7bd333356f1297fe09ae7a1d9f709a
SHA256ba1f1f4aad202ea77fa829856873d1a57b7cf9c2f5bda6da5dd9921bff313c2c
SHA5121e7eeafa04e9a17ab799c7e9b95779095ca9b2eccd0915260d6605a6ef520405cb1840db7ad51520c9cc213e11e93b856267deb36d2bdfe9cac03cb601bd328a
-
Filesize
101KB
MD5cb9374911bf5237179785c739a322c0f
SHA13f4d3dd3d58c9f19dfbb414ded16969ebd9f74b9
SHA256f7f3300b78148a34f6a35796c777a832b638b6d3193e11f4a37f45d4c6dfa845
SHA5129d47521538148b1823c0a17baa86ddf932f06f46d5d8b63fa87b2cc220fb98ce3f933e32d771222937bb8e41c88030839d489d1cd78b062bffeb2980dc6864be
-
Filesize
732KB
MD592aa1db3d02f3c2926bcba98ea68658d
SHA1e5ac82332415a88fc357e9ee54d4c0db68cf1c75
SHA256cc850eb11ecc6e3583f6a4fc8cd7f31d5dede0c1eea1fba1d696a4fd7864645a
SHA512df8b3229335af32e736913cc77ba51fe2e2a4b4b3dbd7dee026215da333e7555abefa427947ff2cb0454001aab6e6175787c60c108ccb5b4c928ade3826bc270
-
Filesize
1004KB
MD536aacecf00d46356862990204e56b851
SHA185db5568707b5201ba97b5aa1915d1b5dcb47552
SHA256528888912375b53078e075bb732b2ad6bc91d48f7e819aa0b06c9a997bf4423a
SHA512c0578fd6fea0f7bde0d08657b8fb5766fb00f015bb4bb8852b4cdf3c1a6b4999c537518c07739f747037b9f02cfbb108d8f5516f2f479323bafd8b965db7d304
-
Filesize
76KB
MD5b6d6477a0c90a81624c6a8548026b4d0
SHA1e6eac6941d27f76bbd306c2938c0a962dbf1ced1
SHA256a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb
SHA51272ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe
-
Filesize
1KB
MD50f5bbc55c4bb4bf799ef94814eb7b0cd
SHA1ea1bf5d73ad3d488fb4ea576ceabb968a412cafb
SHA256137af014f3fac6bd2fe2854511f36d1d31dc6d283282fa9588f86ee2f1469d57
SHA512219d789528daa13d786dd4b52742366949b68549c476e72d9014a9020187b8ec89aa69cf5260b6872770c3fcf18a5273d1d8631af493e364888f0a24817919ae