Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
8c74a5957b9bf68722fb5b45ee791d9eb62a6ece1cbc3cc97c726556df7bc8de.dll
Resource
win7-20240903-en
General
-
Target
8c74a5957b9bf68722fb5b45ee791d9eb62a6ece1cbc3cc97c726556df7bc8de.dll
-
Size
700KB
-
MD5
c594f03ac5b4fe79eb093364db1115fe
-
SHA1
ec0557352f8922a2f5241910b20e29e742d76263
-
SHA256
8c74a5957b9bf68722fb5b45ee791d9eb62a6ece1cbc3cc97c726556df7bc8de
-
SHA512
f942344aecf5f5af63a5e6dc3bae4c00f08b42927f122b0a947fd8e97096b6f6725540b17794d072cd3daebf94102d0701127515332b70e83cff27de559c3d4d
-
SSDEEP
12288:pqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:pqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1076-4-0x0000000002570000-0x0000000002571000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/3052-0-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1076-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1076-36-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1076-35-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/3052-44-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2132-53-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2132-58-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2456-74-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2060-90-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
raserver.exenotepad.exeicardagt.exepid process 2132 raserver.exe 2456 notepad.exe 2060 icardagt.exe -
Loads dropped DLL 7 IoCs
Processes:
raserver.exenotepad.exeicardagt.exepid process 1076 2132 raserver.exe 1076 2456 notepad.exe 1076 2060 icardagt.exe 1076 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rtunysabu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CTLs\\sPAWa\\notepad.exe" -
Processes:
rundll32.exeraserver.exenotepad.exeicardagt.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeraserver.exepid process 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 2132 raserver.exe 2132 raserver.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1076 wrote to memory of 2852 1076 raserver.exe PID 1076 wrote to memory of 2852 1076 raserver.exe PID 1076 wrote to memory of 2852 1076 raserver.exe PID 1076 wrote to memory of 2132 1076 raserver.exe PID 1076 wrote to memory of 2132 1076 raserver.exe PID 1076 wrote to memory of 2132 1076 raserver.exe PID 1076 wrote to memory of 2576 1076 notepad.exe PID 1076 wrote to memory of 2576 1076 notepad.exe PID 1076 wrote to memory of 2576 1076 notepad.exe PID 1076 wrote to memory of 2456 1076 notepad.exe PID 1076 wrote to memory of 2456 1076 notepad.exe PID 1076 wrote to memory of 2456 1076 notepad.exe PID 1076 wrote to memory of 640 1076 icardagt.exe PID 1076 wrote to memory of 640 1076 icardagt.exe PID 1076 wrote to memory of 640 1076 icardagt.exe PID 1076 wrote to memory of 2060 1076 icardagt.exe PID 1076 wrote to memory of 2060 1076 icardagt.exe PID 1076 wrote to memory of 2060 1076 icardagt.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c74a5957b9bf68722fb5b45ee791d9eb62a6ece1cbc3cc97c726556df7bc8de.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:2852
-
C:\Users\Admin\AppData\Local\sDN9vdQ\raserver.exeC:\Users\Admin\AppData\Local\sDN9vdQ\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Local\tLpVw\notepad.exeC:\Users\Admin\AppData\Local\tLpVw\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2456
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵PID:640
-
C:\Users\Admin\AppData\Local\A7QEwmP\icardagt.exeC:\Users\Admin\AppData\Local\A7QEwmP\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5f0ed0a336f8460cd2f52b3857fe6e5d1
SHA1a3d9cb7c4b96194d49cc50eb232f67738042446c
SHA2565a8859c83ebf39553432f220715bb60518d0e5490f0b2a40060547aafa98f2c6
SHA512fe4b304a102a9a9075eea7d77bbe30dccd54c9824b91d3487d54621442e716aa0dc1139f21931963fdf5a14aa90faebe19dcb56afbeb7fd0defdaa2813b2283f
-
Filesize
704KB
MD53ac74b2777bf6ff74c4f5dfc37cbb952
SHA1026660e56bacfb2dc0fc4b9820d2d0c9be2bb8db
SHA25662f41fc849536e954d46320773017dbed0bb327c8112cfbe4eec483ac9071214
SHA512a0ee3697a90a9721b6baf0cc51324e0eb0dedfff91f33032a47cd5246d88003f22852a4d971c02737b2e9fa69a2da6c0efd593491908974ed64aa6c84a62210b
-
Filesize
704KB
MD5b4660d68ee1906d4cb66f8b40269bead
SHA10a8a522767db7d2efd6f1e2864a50568828d32a7
SHA256900260154076701daae0e7b83c3ea64723ec3d7281a43192356c9cef8ea38a19
SHA51206a2733981f5f389c698c2bf46c8b5ae41ee9c4c3ef0d41d2497cce7629d3ffb248c7822368dadfea0b0a63663e32e404627cd56153767cbfa8b0c309e873a2f
-
Filesize
1KB
MD5769656a7c9be7ffaa7b92114dc6ab001
SHA1f2adf471c64bbfd6aa3de6f4bbdca53d69d8af73
SHA256a1a35903744a7011cef680948038092007dca10650e2416017ea186c9e35d2ec
SHA512e46412f606e9d5378bf3ceae14d18976b0c0c695756d11533ebd34503a9431428448075ade5f6d5a2df1fc26e6536fafd9ff11fcadc89a4f1b7adf2409f177de
-
Filesize
1.3MB
MD52fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
Filesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
Filesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8