Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
c96f6800e719594a0985a65c2b5b86590c7470a36872f13804d5dbbcf4df32f9.dll
Resource
win7-20240903-en
General
-
Target
c96f6800e719594a0985a65c2b5b86590c7470a36872f13804d5dbbcf4df32f9.dll
-
Size
696KB
-
MD5
631038be4bd53f745415c744e811f016
-
SHA1
bf6039ad50e15305c2983d6ee8ff6cf1cfeb8fec
-
SHA256
c96f6800e719594a0985a65c2b5b86590c7470a36872f13804d5dbbcf4df32f9
-
SHA512
5abcc343583f350ebff83996ffaea1faca0491f5a85e2a1b739263100899bb88ef5969dc180c4d7d91c248f0f20a45b7b9b6187462ea98d70284cb4dd6a88385
-
SSDEEP
12288:eqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:eqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1180-4-0x0000000002D50000-0x0000000002D51000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1632-0-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1180-23-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1180-35-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1180-34-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1632-43-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2656-53-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2656-57-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1972-74-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2940-90-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
BdeUISrv.exeSndVol.exeAdapterTroubleshooter.exepid process 2656 BdeUISrv.exe 1972 SndVol.exe 2940 AdapterTroubleshooter.exe -
Loads dropped DLL 7 IoCs
Processes:
BdeUISrv.exeSndVol.exeAdapterTroubleshooter.exepid process 1180 2656 BdeUISrv.exe 1180 1972 SndVol.exe 1180 2940 AdapterTroubleshooter.exe 1180 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dnfwvyvycst = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\uVvaZ\\SndVol.exe" -
Processes:
BdeUISrv.exeSndVol.exeAdapterTroubleshooter.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdapterTroubleshooter.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeBdeUISrv.exepid process 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 2656 BdeUISrv.exe 2656 BdeUISrv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1180 wrote to memory of 2824 1180 BdeUISrv.exe PID 1180 wrote to memory of 2824 1180 BdeUISrv.exe PID 1180 wrote to memory of 2824 1180 BdeUISrv.exe PID 1180 wrote to memory of 2656 1180 BdeUISrv.exe PID 1180 wrote to memory of 2656 1180 BdeUISrv.exe PID 1180 wrote to memory of 2656 1180 BdeUISrv.exe PID 1180 wrote to memory of 2264 1180 SndVol.exe PID 1180 wrote to memory of 2264 1180 SndVol.exe PID 1180 wrote to memory of 2264 1180 SndVol.exe PID 1180 wrote to memory of 1972 1180 SndVol.exe PID 1180 wrote to memory of 1972 1180 SndVol.exe PID 1180 wrote to memory of 1972 1180 SndVol.exe PID 1180 wrote to memory of 2936 1180 AdapterTroubleshooter.exe PID 1180 wrote to memory of 2936 1180 AdapterTroubleshooter.exe PID 1180 wrote to memory of 2936 1180 AdapterTroubleshooter.exe PID 1180 wrote to memory of 2940 1180 AdapterTroubleshooter.exe PID 1180 wrote to memory of 2940 1180 AdapterTroubleshooter.exe PID 1180 wrote to memory of 2940 1180 AdapterTroubleshooter.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f6800e719594a0985a65c2b5b86590c7470a36872f13804d5dbbcf4df32f9.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:2824
-
C:\Users\Admin\AppData\Local\cXZgxw80\BdeUISrv.exeC:\Users\Admin\AppData\Local\cXZgxw80\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:2264
-
C:\Users\Admin\AppData\Local\ExG\SndVol.exeC:\Users\Admin\AppData\Local\ExG\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1972
-
C:\Windows\system32\AdapterTroubleshooter.exeC:\Windows\system32\AdapterTroubleshooter.exe1⤵PID:2936
-
C:\Users\Admin\AppData\Local\5TcO\AdapterTroubleshooter.exeC:\Users\Admin\AppData\Local\5TcO\AdapterTroubleshooter.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD56ff39e807917d75237bbec4d04c4735b
SHA10c9172df985b7abecb82e79fd85085a0556019f5
SHA256d40b0ec6610732289e5dbc310ad1147b6464a5fd027baa88e75c144f8af94aac
SHA5121823ae346084ceb5f1159339fc06e3439592b32aac61ff7068cbc868c388c5ce9369e2f91fe4538018f19aa6e2c47dfbd292fa12b6f3a681d9cb251a263a0878
-
Filesize
700KB
MD5e5e5dfbdf06c428e5d669c902b385ecb
SHA1a31a5f5950d4980b68db7a1e972aec3b1f67b2d5
SHA256603e649b4ab7d5076cdca4819c1d1a3d4bca26dff612d758a20d1dd71845d331
SHA512a0cf36dbb126114ee3328931fa4d554b7e007a8a4639c4cf90af7e023155676a8ff819ca20a22626cae75b8814abdae29fe0403002d938f67be19d6444b6e6dc
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
Filesize
700KB
MD5e7f3a8bc55ddf35b519edfb3cf0547ea
SHA18f7649d56c5f86f0ce13a4b6640408eebd693c34
SHA2563ec0025f8f7118cd7263af1047395c22b79679b93594d0101696463b7acd22b2
SHA51286d1ba97c80ab53386b9e0a4f446271e1e432f62b1aad3281b568a992fba90231671eac8f6c51246c6547adebb9e27bd03c72ff69a43b735e25318f55fd22af4
-
Filesize
1KB
MD55d265db588afa49f871e30fd71caed9e
SHA16247e28e6662b4c739de1a0870ac32715def4907
SHA2566784d5f6aa77f875602790d7d3df376876402f4459a985b5d4909685dc9dab88
SHA5123bb1600eada207ab892809c127835e3b6fb8482f3af76f6b325eb92b9ee8446d35a246244afd34cb38818155efec8c6c045d90eb69bcb6d2933b9311f1d681bb
-
Filesize
39KB
MD5d4170c9ff5b2f85b0ce0246033d26919
SHA1a76118e8775e16237cf00f2fb79718be0dc84db1
SHA256d05e010a2570cdd5a67f62c99483aeeecb6a8d5ecc523cd49b158a460c9be5da
SHA5129c85a9ea4002bd55cf9c51e470dd1bec527ff04b5d0d6f83094a998c541416cd47c9f42c6ca7e35ffa2842877f79e3c2e989489b9bf81644c5c57bb406b89608
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9