Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
8c74a5957b9bf68722fb5b45ee791d9eb62a6ece1cbc3cc97c726556df7bc8de.dll
Resource
win7-20240903-en
General
-
Target
8c74a5957b9bf68722fb5b45ee791d9eb62a6ece1cbc3cc97c726556df7bc8de.dll
-
Size
700KB
-
MD5
c594f03ac5b4fe79eb093364db1115fe
-
SHA1
ec0557352f8922a2f5241910b20e29e742d76263
-
SHA256
8c74a5957b9bf68722fb5b45ee791d9eb62a6ece1cbc3cc97c726556df7bc8de
-
SHA512
f942344aecf5f5af63a5e6dc3bae4c00f08b42927f122b0a947fd8e97096b6f6725540b17794d072cd3daebf94102d0701127515332b70e83cff27de559c3d4d
-
SSDEEP
12288:pqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:pqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3404-3-0x0000000001440000-0x0000000001441000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1400-1-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3404-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3404-35-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/1400-38-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/1848-46-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/1848-50-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/1104-66-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/3324-81-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
recdisc.exeApplicationFrameHost.exeApplySettingsTemplateCatalog.exepid process 1848 recdisc.exe 1104 ApplicationFrameHost.exe 3324 ApplySettingsTemplateCatalog.exe -
Loads dropped DLL 3 IoCs
Processes:
recdisc.exeApplicationFrameHost.exeApplySettingsTemplateCatalog.exepid process 1848 recdisc.exe 1104 ApplicationFrameHost.exe 3324 ApplySettingsTemplateCatalog.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qiqbxsgjw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-3756129449-3121373848-4276368241-1000\\Dpa8\\ApplicationFrameHost.exe" -
Processes:
recdisc.exeApplicationFrameHost.exeApplySettingsTemplateCatalog.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplicationFrameHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplySettingsTemplateCatalog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3404 wrote to memory of 1620 3404 recdisc.exe PID 3404 wrote to memory of 1620 3404 recdisc.exe PID 3404 wrote to memory of 1848 3404 recdisc.exe PID 3404 wrote to memory of 1848 3404 recdisc.exe PID 3404 wrote to memory of 1248 3404 ApplicationFrameHost.exe PID 3404 wrote to memory of 1248 3404 ApplicationFrameHost.exe PID 3404 wrote to memory of 1104 3404 ApplicationFrameHost.exe PID 3404 wrote to memory of 1104 3404 ApplicationFrameHost.exe PID 3404 wrote to memory of 4304 3404 ApplySettingsTemplateCatalog.exe PID 3404 wrote to memory of 4304 3404 ApplySettingsTemplateCatalog.exe PID 3404 wrote to memory of 3324 3404 ApplySettingsTemplateCatalog.exe PID 3404 wrote to memory of 3324 3404 ApplySettingsTemplateCatalog.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c74a5957b9bf68722fb5b45ee791d9eb62a6ece1cbc3cc97c726556df7bc8de.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵PID:1620
-
C:\Users\Admin\AppData\Local\sjlfl2\recdisc.exeC:\Users\Admin\AppData\Local\sjlfl2\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1848
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe1⤵PID:1248
-
C:\Users\Admin\AppData\Local\uM9ZVI\ApplicationFrameHost.exeC:\Users\Admin\AppData\Local\uM9ZVI\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1104
-
C:\Windows\system32\ApplySettingsTemplateCatalog.exeC:\Windows\system32\ApplySettingsTemplateCatalog.exe1⤵PID:4304
-
C:\Users\Admin\AppData\Local\yzm\ApplySettingsTemplateCatalog.exeC:\Users\Admin\AppData\Local\yzm\ApplySettingsTemplateCatalog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5e661e870cb62cb71cc89a5789bd94699
SHA1f133d53190ffe46f07a9c32cbf6b0344e26407d0
SHA25662522b7aa95c1b060336072a5e4d2bde8d45515228476afac63f9004af90da83
SHA512eebeef0483a7ef8dd81984462e7b1cce3c91c3b4767704a1e819ed566b4c14ed8c03f10539d2e8544d77b1bd85119d12ab33477571cc691d032b450fa5cdc5d6
-
Filesize
193KB
MD518afee6824c84bf5115bada75ff0a3e7
SHA1d10f287a7176f57b3b2b315a5310d25b449795aa
SHA2560787b37cf197595b8149ffe3784f9c59eacde3616011f185513ff5c075a5ac4e
SHA512517356165b401dbebf15437d3b17746aef5a6a4cc62a0afe45966abc92b4cf377eee4514a36ee28b1e88e55a22a2f8a6c997df45971e7f354b66ac7d9e141845
-
Filesize
76KB
MD5d58a8a987a8dafad9dc32a548cc061e7
SHA1f79fc9e0ab066cad530b949c2153c532a5223156
SHA256cf58e424b86775e6f2354291052126a646f842fff811b730714dfbbd8ebc71a4
SHA51293df28b65af23a5f82124ba644e821614e2e2074c98dbb2bd7319d1dfe9e2179b9d660d7720913c79a8e7b2f8560440789ad5e170b9d94670589885060c14265
-
Filesize
704KB
MD5ab5e75c006522792ecb039ca8c4ae739
SHA14ea9593d084f90fffc7dc75d39b5e6e44c1ba0d4
SHA256a02e2be56cde31a1ea84d59b88935c4589b367f4555ed74fed0a07697cd13a03
SHA512380f1ad55fc5ef1b3cd71fab8707380cbf18d0d5925ae530306d66260aad8f7cf6180fa40038f68c46ed3d83ed48d22a3ece85f01a80980217fbe5d3df235919
-
Filesize
704KB
MD5787959b32dc01f206f42121f038769a1
SHA13c380b815ab1f76472eb6c3d61711252bc8bfe3d
SHA2562a8dae4efebabb618855bccda3f41650205d071a64b59f896742ea2cc75f6c1d
SHA512de1c518da16b76fca688c47a922fe826989d2b67c87350c474ff4a79ad593ea69df12e7abb43d319d2125b9d8f5aa2ac0745734fd4e5c5fe8a2f235c146d2706
-
Filesize
1.1MB
MD513af41b1c1c53c7360cd582a82ec2093
SHA17425f893d1245e351483ab4a20a5f59d114df4e1
SHA256a462f29efaaa3c30411e76f32608a2ba5b7d21af3b9804e5dda99e342ba8c429
SHA512c7c82acef623d964c520f1a458dbfe34099981de0b781fb56e14b1f82632e3a8437db6434e7c20988aa3b39efde47aab8d188e80845e841a13e74b079285706a
-
Filesize
1KB
MD556397f956132e7e8c767106f55f8fe74
SHA11ffae2f23d93e118a49fb67d6a1db61cede37159
SHA256a14352ad2e1f7652572c1d998ec87585b8d2a2e0a474dec67aa21ef32ee5f410
SHA51250ea0e8decb41c6e801c645ee19ac534a6a6fd43495b5fc158d48ab0612eafaa7cbf1dd7b8e59f7b2d3c017e5bed609ad9def32e953c1d28f6ad9fa7a99db2d8