Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
bf4a030404a33a8c559e6247a6a7dde969beac784237a4bc09ee9782a6b13eb6.dll
Resource
win7-20240903-en
General
-
Target
bf4a030404a33a8c559e6247a6a7dde969beac784237a4bc09ee9782a6b13eb6.dll
-
Size
700KB
-
MD5
22bb81fe492c73919a75ae4152bd6da9
-
SHA1
93ea623df22f23cfba08fce532ae04b037f6f93f
-
SHA256
bf4a030404a33a8c559e6247a6a7dde969beac784237a4bc09ee9782a6b13eb6
-
SHA512
60cad20be3e4548eab668e1c1c280d9588241638f320e2d9f36587ea89754c47e47ac4ca692182b7707d326ee6c88229b350f39ef11cf1e9c2b1b2fbf2cc704c
-
SSDEEP
12288:JqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:JqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3436-4-0x00000000009A0000-0x00000000009A1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/5040-0-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3436-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3436-36-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/5040-38-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3576-45-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral2/memory/3576-50-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral2/memory/4352-62-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/4352-66-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/2792-81-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
RdpSa.exemsinfo32.exeRecoveryDrive.exepid Process 3576 RdpSa.exe 4352 msinfo32.exe 2792 RecoveryDrive.exe -
Loads dropped DLL 3 IoCs
Processes:
RdpSa.exemsinfo32.exeRecoveryDrive.exepid Process 3576 RdpSa.exe 4352 msinfo32.exe 2792 RecoveryDrive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qhmytabp = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\PSS42prL\\msinfo32.exe" -
Processes:
rundll32.exeRdpSa.exemsinfo32.exeRecoveryDrive.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RecoveryDrive.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 5040 rundll32.exe 5040 rundll32.exe 5040 rundll32.exe 5040 rundll32.exe 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 3436 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3436 wrote to memory of 4624 3436 96 PID 3436 wrote to memory of 4624 3436 96 PID 3436 wrote to memory of 3576 3436 97 PID 3436 wrote to memory of 3576 3436 97 PID 3436 wrote to memory of 4204 3436 98 PID 3436 wrote to memory of 4204 3436 98 PID 3436 wrote to memory of 4352 3436 99 PID 3436 wrote to memory of 4352 3436 99 PID 3436 wrote to memory of 2728 3436 100 PID 3436 wrote to memory of 2728 3436 100 PID 3436 wrote to memory of 2792 3436 101 PID 3436 wrote to memory of 2792 3436 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf4a030404a33a8c559e6247a6a7dde969beac784237a4bc09ee9782a6b13eb6.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe1⤵PID:4624
-
C:\Users\Admin\AppData\Local\34KDBb\RdpSa.exeC:\Users\Admin\AppData\Local\34KDBb\RdpSa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3576
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵PID:4204
-
C:\Users\Admin\AppData\Local\vFha3\msinfo32.exeC:\Users\Admin\AppData\Local\vFha3\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4352
-
C:\Windows\system32\RecoveryDrive.exeC:\Windows\system32\RecoveryDrive.exe1⤵PID:2728
-
C:\Users\Admin\AppData\Local\jmmib1u\RecoveryDrive.exeC:\Users\Admin\AppData\Local\jmmib1u\RecoveryDrive.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD55992f5b5d0b296b83877da15b54dd1b4
SHA10d87be8d4b7aeada4b55d1d05c0539df892f8f82
SHA25632f60eabe54c4d0cd0f0ec29f48f55ca1ad097bf35097247b186fd70426f847c
SHA5124f6da913af530301da1d0638aa2635ada446ebee6e27b5059db5c2b7fe439162ac3b1a595ecf4163a093890df9ac94d9085a53d8c991e48703f9d2691326e7e6
-
Filesize
708KB
MD51057bec46fb851a7c5bfc4e222919390
SHA1db5534dcee761610c08a5feb38b26266175d7322
SHA2560c0bad13573d1c12006cc7d4c95025752029465c10c424f8179b9f0b60556ca6
SHA512155637711b295bddf8708478f7d54d0ec7731b03aaa8988696f1fd5e8270af4ea2075744665ae3152729263993de3020861811a47bca1ecdba990520395148d3
-
Filesize
911KB
MD5b9b3dc6f2eb89e41ff27400952602c74
SHA124ae07e0db3ace0809d08bbd039db3a9d533e81b
SHA256630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4
SHA5127906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe
-
Filesize
704KB
MD5d07cc9dd83d8eb97c7bc1b6f2074c75c
SHA1d6a65914d9e829531c4f8af2a8939ae509a9bd8c
SHA2562a59c395e1f3f8af24b2e6c3b7e4db0aad11463a4fd34e28496cadb5cef7b929
SHA512b13cfaa100226ea4ba240bebef295da07f931d68eefe932503071cb3210bc7f8327fc39d6daa862a116f7acc036b0ee4ffa76ff3e0e4457217445bf6eca41ccb
-
Filesize
704KB
MD502f76180d49cba2b5e2bbbd0e97bf9ae
SHA17f478536e16ec8bcfa226ed2cadbf7020b5bf86d
SHA25612acab01c811dbf50bd58703f3fc179babe6d10b386aad2ee0b861159f76fe7a
SHA512b88949b33dbf6c6f70fbf9fae0da913ae7713f5b0412ca6bb150b8f6cdf3b33a19166ff5b5eb8122378d6a8391d8c816ad6557fa7b50cc4530fcba594d873b44
-
Filesize
376KB
MD50aed91da63713bf9f881b03a604a1c9d
SHA1b1b2d292cb1a4c13dc243b5eab13afb316a28b9a
SHA2565cf1604d2473661266e08fc0e4e144ea98f99b7584c43585eb2b01551130fd14
SHA51204bca9b321d702122b6e72c2ad15b7cd98924e5dfc3b8dd0e907ea28fd7826d3f72b98c67242b6698594df648d3c2b6b0952bb52a2363b687bbe44a66e830c03
-
Filesize
1KB
MD54322da7bf0bfbd219ea93ea624e6ec14
SHA19098a3f373c3fbcffec34e6319943fa8a0f5c72e
SHA256eb1264fe47ec5da8868e6198a593df71231e6543c523534e47f933d39aecf053
SHA5128d912c89e0521a5c2e8b2d0c301c5ac08ef5596103489e897b7949ab719ce6c2cc27598856bfcfc8513bfd07b1b25651c141bd362c67d29898e3cccdcca3e9b2