Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
e0bb41f16dbcd4feeadcb96519eee1d82877b76b83776bd7776a648021644fce.dll
Resource
win7-20240729-en
General
-
Target
e0bb41f16dbcd4feeadcb96519eee1d82877b76b83776bd7776a648021644fce.dll
-
Size
700KB
-
MD5
45424a5476cd3741110250714626b4e4
-
SHA1
6cd678d66094c596200c3e6cbdbac1147077961a
-
SHA256
e0bb41f16dbcd4feeadcb96519eee1d82877b76b83776bd7776a648021644fce
-
SHA512
cf6152d4a2094a951d16f9583ad2080027264b21556bd38b4d381c88e17575e8d6e44417ac710cdab801913240753b6fd6064724220772ae928a79bac3937789
-
SSDEEP
12288:JqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:JqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3416-4-0x0000000002480000-0x0000000002481000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/224-1-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3416-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3416-35-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/224-38-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/2380-47-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/2380-50-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/2288-57-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/2288-62-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/3168-77-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/5036-92-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
Processes:
mmc.exeomadmclient.exeiexpress.exeBitLockerWizard.exepid process 2380 mmc.exe 2288 omadmclient.exe 3168 iexpress.exe 5036 BitLockerWizard.exe -
Loads dropped DLL 5 IoCs
Processes:
mmc.exeomadmclient.exeiexpress.exeBitLockerWizard.exepid process 2380 mmc.exe 2380 mmc.exe 2288 omadmclient.exe 3168 iexpress.exe 5036 BitLockerWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pzfwfhktmuesbir = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\WORDDO~2\\uzwr2\\iexpress.exe" -
Processes:
iexpress.exeBitLockerWizard.exerundll32.exemmc.exeomadmclient.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA omadmclient.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 224 rundll32.exe 224 rundll32.exe 224 rundll32.exe 224 rundll32.exe 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3416 3416 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3416 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid process target process PID 3416 wrote to memory of 2092 3416 mmc.exe PID 3416 wrote to memory of 2092 3416 mmc.exe PID 3416 wrote to memory of 2380 3416 mmc.exe PID 3416 wrote to memory of 2380 3416 mmc.exe PID 3416 wrote to memory of 3624 3416 omadmclient.exe PID 3416 wrote to memory of 3624 3416 omadmclient.exe PID 3416 wrote to memory of 2288 3416 omadmclient.exe PID 3416 wrote to memory of 2288 3416 omadmclient.exe PID 3416 wrote to memory of 2184 3416 iexpress.exe PID 3416 wrote to memory of 2184 3416 iexpress.exe PID 3416 wrote to memory of 3168 3416 iexpress.exe PID 3416 wrote to memory of 3168 3416 iexpress.exe PID 3416 wrote to memory of 4492 3416 BitLockerWizard.exe PID 3416 wrote to memory of 4492 3416 BitLockerWizard.exe PID 3416 wrote to memory of 5036 3416 BitLockerWizard.exe PID 3416 wrote to memory of 5036 3416 BitLockerWizard.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0bb41f16dbcd4feeadcb96519eee1d82877b76b83776bd7776a648021644fce.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:224
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵PID:2092
-
C:\Users\Admin\AppData\Local\wioH7FAws\mmc.exeC:\Users\Admin\AppData\Local\wioH7FAws\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2380
-
C:\Windows\system32\omadmclient.exeC:\Windows\system32\omadmclient.exe1⤵PID:3624
-
C:\Users\Admin\AppData\Local\KOz\omadmclient.exeC:\Users\Admin\AppData\Local\KOz\omadmclient.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2288
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵PID:2184
-
C:\Users\Admin\AppData\Local\eDlrz6BSV\iexpress.exeC:\Users\Admin\AppData\Local\eDlrz6BSV\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3168
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:4492
-
C:\Users\Admin\AppData\Local\G2Npu0r\BitLockerWizard.exeC:\Users\Admin\AppData\Local\G2Npu0r\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
704KB
MD5b7bbfeb3814fcddfa7374942b97d9d4e
SHA1cd34b2b456709471399c89216e0b710d993f1c63
SHA256ecc483d5191ccb9b1c78cc2ab35a95b671303abc2884a2316f0398d8916db94c
SHA512aa38a6c3a04e0385fbeb2434f697cf4bd196940bd75f919d4e92072377631a510c7422598662b3ef2043fdf72a18e6ed20e6cc68238583c6cc5b7c9664a7d333
-
Filesize
704KB
MD5a5f711047b6f4156f2e2c0fd15988787
SHA1738e5d082cdaa495992b23bbc872e9c624d7891c
SHA2565cdf00c0e961895e87dfb7fd709b2520a913f2ffeaa21e73fdc1403cb9df25fb
SHA5121d6917ae418573315143c9c201c609b725e4a11461a61a1aa77310525e6bada4fecd647c276a15bd79fd37b00e7920df0eee9a82543059522c5d8854ab57058c
-
Filesize
425KB
MD58992b5b28a996eb83761dafb24959ab4
SHA1697ecb33b8ff5b0e73ef29ce471153b368b1b729
SHA256e0c6c1b082c5d61be95b7fad95155b7cb2e516d6dcd51b8e1554a176876699e7
SHA5124ab0d71f6f9e5a5d0870d8e6eaa4b5db74ea6148de0a00603e3e56303d0fec4722172e0207b9678a5bd0136f2d43d43b9d34907183369ab3b9b9c1484034fe3d
-
Filesize
704KB
MD5f7f78768b181e0e6dc03f736b4a70826
SHA1c7e1171cafb261f2d791b3abb213ccdb7fe8b2b4
SHA25617f69f94e4250c079be1e3042431498afd921045395c014a9945c6bde22cb70e
SHA5122dfb31db8c839032bfeb8b59599494cc0a7732581e5d39736cee31d843bdd4f73467133ad11c3fa3e0fb3416cbbd79387761641b8ed235a045a63a2870834205
-
Filesize
166KB
MD517b93a43e25d821d01af40ba6babcc8c
SHA197c978d78056d995f751dfef1388d7cce4cc404a
SHA256d070b79fa254c528babb73d607a7a8fd53db89795d751f42fc0a283b61a76fd3
SHA5126b5743b37a3be8ae9ee2ab84e0749c32c60544298a7cce396470aa40bbd13f2e838d5d98159f21d500d20817c51ebce4b1d2f554e3e05f6c7fc97bc9d70ea391
-
Filesize
728KB
MD5d6bd4eb6374dd6a9ca110226cafe148d
SHA1957a9d2b8f5b39a5543507b384356848b5fb1c33
SHA256c015df8e8dc36a20c0c37f73f5079218ce7d07fb58165bfc46d5f743b209ec1f
SHA5123cc20342a5adabbf139623cad3cadb6eee58b551a5140a1ffa0e6f83d374378f1fb4b910cb54978810773135f1de8ab3893b2e7dad608b9de79c9fa309d24f84
-
Filesize
1.8MB
MD58c86b80518406f14a4952d67185032d6
SHA19269f1fbcf65fefbc88a2e239519c21efe0f6ba5
SHA256895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a
SHA5121bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099
-
Filesize
797B
MD508bb7b054b0a8bcf75879d8ac553e0ff
SHA135121f9a56133ec8b023e5cd643f2ef39047ca22
SHA256a1f153f765e225e554d1698b182ab3b8e15dc9ad4473e5832469f5362f02c16f
SHA5125a8b051b49cd23320adb6d6023c0be9a2e49cf1bd7bf50f497b7ae9e1152e0c21ea49fda369d33dcd9b0ab875498af2b361d2c96d01037099a157b264076a491