Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
bf4a030404a33a8c559e6247a6a7dde969beac784237a4bc09ee9782a6b13eb6.dll
Resource
win7-20240903-en
General
-
Target
bf4a030404a33a8c559e6247a6a7dde969beac784237a4bc09ee9782a6b13eb6.dll
-
Size
700KB
-
MD5
22bb81fe492c73919a75ae4152bd6da9
-
SHA1
93ea623df22f23cfba08fce532ae04b037f6f93f
-
SHA256
bf4a030404a33a8c559e6247a6a7dde969beac784237a4bc09ee9782a6b13eb6
-
SHA512
60cad20be3e4548eab668e1c1c280d9588241638f320e2d9f36587ea89754c47e47ac4ca692182b7707d326ee6c88229b350f39ef11cf1e9c2b1b2fbf2cc704c
-
SSDEEP
12288:JqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:JqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1184-4-0x0000000002E50000-0x0000000002E51000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2532-1-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1184-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1184-35-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1184-36-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2532-44-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2124-53-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral1/memory/2124-57-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral1/memory/2648-69-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2648-74-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2364-90-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
winlogon.execttune.exeEhStorAuthn.exepid process 2124 winlogon.exe 2648 cttune.exe 2364 EhStorAuthn.exe -
Loads dropped DLL 7 IoCs
Processes:
winlogon.execttune.exeEhStorAuthn.exepid process 1184 2124 winlogon.exe 1184 2648 cttune.exe 1184 2364 EhStorAuthn.exe 1184 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wtobeyey = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\AutomaticDestinations\\BUiv9VKS\\cttune.exe" -
Processes:
rundll32.exewinlogon.execttune.exeEhStorAuthn.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2532 rundll32.exe 2532 rundll32.exe 2532 rundll32.exe 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1184 wrote to memory of 2716 1184 winlogon.exe PID 1184 wrote to memory of 2716 1184 winlogon.exe PID 1184 wrote to memory of 2716 1184 winlogon.exe PID 1184 wrote to memory of 2124 1184 winlogon.exe PID 1184 wrote to memory of 2124 1184 winlogon.exe PID 1184 wrote to memory of 2124 1184 winlogon.exe PID 1184 wrote to memory of 2208 1184 cttune.exe PID 1184 wrote to memory of 2208 1184 cttune.exe PID 1184 wrote to memory of 2208 1184 cttune.exe PID 1184 wrote to memory of 2648 1184 cttune.exe PID 1184 wrote to memory of 2648 1184 cttune.exe PID 1184 wrote to memory of 2648 1184 cttune.exe PID 1184 wrote to memory of 1212 1184 EhStorAuthn.exe PID 1184 wrote to memory of 1212 1184 EhStorAuthn.exe PID 1184 wrote to memory of 1212 1184 EhStorAuthn.exe PID 1184 wrote to memory of 2364 1184 EhStorAuthn.exe PID 1184 wrote to memory of 2364 1184 EhStorAuthn.exe PID 1184 wrote to memory of 2364 1184 EhStorAuthn.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf4a030404a33a8c559e6247a6a7dde969beac784237a4bc09ee9782a6b13eb6.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵PID:2716
-
C:\Users\Admin\AppData\Local\FsGou\winlogon.exeC:\Users\Admin\AppData\Local\FsGou\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2124
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵PID:2208
-
C:\Users\Admin\AppData\Local\EuU1q\cttune.exeC:\Users\Admin\AppData\Local\EuU1q\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2648
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵PID:1212
-
C:\Users\Admin\AppData\Local\sHD\EhStorAuthn.exeC:\Users\Admin\AppData\Local\sHD\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5516757270e7e3e9adc90386ad3d31ddc
SHA11ee3c362c08bf06f8da489d6aba76d7de923071d
SHA2562f4a776a33216a3a1b64040f77906d2ff06e36e04ca8e35c0efa90f5500aa985
SHA5128af9260f9bd0602f313513ba9e30f5b23d2f689e27069188838369e899bc1df8899cc417d2de0746436b8cd0cac22eb5a59c43409a54af5858f4763d3add9935
-
Filesize
708KB
MD50972b290fbfc9352d7e9eabeb3c8926a
SHA1f0784ac6857596023b580318db8b2ed8e9874c14
SHA256ed0a18d91a09b9fd5553a015ca49ab6e072ac5d8e63ecafc473fc1a7436f3b75
SHA512b8cb79b6212e5dd1ea6abbe5b3401a62e6ce529919889c18d77f54ebf6eaad5f60ccad0a175ff1a07944db026a29f427d48d5f51a78c4d4e6699269d381793d8
-
Filesize
704KB
MD518472c3ec14145932ac5b14ca284a641
SHA15b4a895b4b1bf8b96cad1ee632eb388c992fc0ba
SHA2561991cb2436ae4c131628ccaec120b09e9bcbc42092d07bf6dd84edb653749418
SHA512f8096a8fd0f04752e5593b5efe21b7d980c2b431574b0f730c33b5c7bf822bbfb057cdae590374553c86dd770e7455760f0d42c59f63674c8fd7c1c6665b2e66
-
Filesize
1KB
MD589c86859001de4fe2a87304ef1dfe041
SHA1ae4872d5f7780413f5af2a00c98decec32ed39ca
SHA256ac065d445dd74388474807a477da0810019427cfcd7870167bc503a122618048
SHA5124d3a73900da904f2f0d39d33cdece21a8239282fc034c2468ac10e11d38e54f1dc86bd3a4d00c08eb8337aa81453bcfb8c493204309e63774e206316dc413f92
-
Filesize
314KB
MD57116848fd23e6195fcbbccdf83ce9af4
SHA135fb16a0b68f8a84d5dfac8c110ef5972f1bee93
SHA25639937665f72725bdb3b82389a5dbd906c63f4c14208312d7f7a59d6067e1cfa6
SHA512e38bf57eee5836b8598dd88dc3d266f497d911419a8426f73df6dcaa503611a965aabbd746181cb19bc38eebdb48db778a17f781a8f9e706cbd7a6ebec38f894
-
Filesize
381KB
MD51151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
Filesize
137KB
MD53abe95d92c80dc79707d8e168d79a994
SHA164b10c17f602d3f21c84954541e7092bc55bb5ab
SHA2562159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad
SHA51270fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c