Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
e0bb41f16dbcd4feeadcb96519eee1d82877b76b83776bd7776a648021644fce.dll
Resource
win7-20240729-en
General
-
Target
e0bb41f16dbcd4feeadcb96519eee1d82877b76b83776bd7776a648021644fce.dll
-
Size
700KB
-
MD5
45424a5476cd3741110250714626b4e4
-
SHA1
6cd678d66094c596200c3e6cbdbac1147077961a
-
SHA256
e0bb41f16dbcd4feeadcb96519eee1d82877b76b83776bd7776a648021644fce
-
SHA512
cf6152d4a2094a951d16f9583ad2080027264b21556bd38b4d381c88e17575e8d6e44417ac710cdab801913240753b6fd6064724220772ae928a79bac3937789
-
SSDEEP
12288:JqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:JqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1284-4-0x0000000002060000-0x0000000002061000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2420-0-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1284-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1284-36-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1284-37-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2420-44-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2708-53-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2708-58-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/448-75-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/1656-91-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
dccw.exevmicsvc.exespreview.exepid process 2708 dccw.exe 448 vmicsvc.exe 1656 spreview.exe -
Loads dropped DLL 7 IoCs
Processes:
dccw.exevmicsvc.exespreview.exepid process 1284 2708 dccw.exe 1284 448 vmicsvc.exe 1284 1656 spreview.exe 1284 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\1xWbUhko2\\vmicsvc.exe" -
Processes:
rundll32.exedccw.exevmicsvc.exespreview.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exedccw.exepid process 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 2708 dccw.exe 2708 dccw.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1284 wrote to memory of 2824 1284 dccw.exe PID 1284 wrote to memory of 2824 1284 dccw.exe PID 1284 wrote to memory of 2824 1284 dccw.exe PID 1284 wrote to memory of 2708 1284 dccw.exe PID 1284 wrote to memory of 2708 1284 dccw.exe PID 1284 wrote to memory of 2708 1284 dccw.exe PID 1284 wrote to memory of 3060 1284 vmicsvc.exe PID 1284 wrote to memory of 3060 1284 vmicsvc.exe PID 1284 wrote to memory of 3060 1284 vmicsvc.exe PID 1284 wrote to memory of 448 1284 vmicsvc.exe PID 1284 wrote to memory of 448 1284 vmicsvc.exe PID 1284 wrote to memory of 448 1284 vmicsvc.exe PID 1284 wrote to memory of 2424 1284 spreview.exe PID 1284 wrote to memory of 2424 1284 spreview.exe PID 1284 wrote to memory of 2424 1284 spreview.exe PID 1284 wrote to memory of 1656 1284 spreview.exe PID 1284 wrote to memory of 1656 1284 spreview.exe PID 1284 wrote to memory of 1656 1284 spreview.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0bb41f16dbcd4feeadcb96519eee1d82877b76b83776bd7776a648021644fce.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵PID:2824
-
C:\Users\Admin\AppData\Local\1PYFaESwh\dccw.exeC:\Users\Admin\AppData\Local\1PYFaESwh\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵PID:3060
-
C:\Users\Admin\AppData\Local\L6IqGG\vmicsvc.exeC:\Users\Admin\AppData\Local\L6IqGG\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:448
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵PID:2424
-
C:\Users\Admin\AppData\Local\8cGKml\spreview.exeC:\Users\Admin\AppData\Local\8cGKml\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
704KB
MD56f765dbf9763dcfd0f6e6fc7b733ba8a
SHA1600a0106c40abd10aa89f135b8f7b29cedaf60f4
SHA256dc1d4657f5d16f17ef7c52558bac9a4d1b5f64403896ee1b5c48c4d703602ff5
SHA512894c67a1e2c3fcbd12670fa78230b1119eb621580a98fca89fad1597fbddb7fd032b58c01c9f654fecc688dedcb2bbed7d1ab27bfa037f4649db9ff107c9b929
-
Filesize
704KB
MD55a8a9950b69985dce56bfddfcdc2501e
SHA1162c633145c4df5200fef184393a81e86b91fd4d
SHA25647a88d207c9fca92eb6dfc4a2be71c85f4214de54f280ce55e63542c9ecd0af9
SHA5120c01a6c2d218cac9b3072c4f65d014bde1db83e3436b629b1fcd91b4677ac98fe8f82da8aa1b97e60116eeb685abe104fe1bbc339fb9f4834b213e10c8aafbf8
-
Filesize
238KB
MD579e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
Filesize
916B
MD5426e4d3548d1b0567b38afc4eaf58fb3
SHA1cbcdc2da90b05b589fcaf20ffeec3bdd17e9a2a1
SHA2561e139d863f2bd8831abfee3e8d007402eaa06f8b8717d4fb97d0bace7dcecc06
SHA512d39a40cf714f006a1ea5eb7738c31d49715a15f600dcd15078c776d2115befb468636e7783f2015e416bf2fabfe785444774a1fa43dcc556c586a6a2c694e245
-
Filesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
Filesize
704KB
MD5eff6b4d720b2ac70089ee77ed28249c2
SHA10bbc5756dec4ca529ea8aa21585eb50db791c373
SHA256fa2ab1d76af63e22339ef9fd6fc05f4803fd0e17d6648e62e4f4f17777966632
SHA51217798b7b8f7781b5eda2da77cd1581f3ac26116ce268c8c376b0723ac97384bc86904ee8f221243d9ea5ac5fd59035f4e2bae2e65e1ebc089c1c777112a31455