Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f.dll
Resource
win10v2004-20241007-en
General
-
Target
582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f.dll
-
Size
696KB
-
MD5
0a3cf587cfebb06a98eb27d2200ddf2a
-
SHA1
cb58b536bfb54b7ee2795a8939361465a8cb262e
-
SHA256
582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f
-
SHA512
806a83b20039618e181ccb87f9658cdb6dd25cef4b59d3bfc7c3a65381f1b67440e015dfe4f756f3c7e05ec05f3bba06732e32e51ddabc1295b803254ab9fd0f
-
SSDEEP
12288:BqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:BqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1352-4-0x0000000002590000-0x0000000002591000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2880-1-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1352-23-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1352-35-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1352-34-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2880-43-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2620-52-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2620-57-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2996-74-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2988-90-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
javaws.exemsdtc.exeUI0Detect.exepid Process 2620 javaws.exe 2996 msdtc.exe 2988 UI0Detect.exe -
Loads dropped DLL 7 IoCs
Processes:
javaws.exemsdtc.exeUI0Detect.exepid Process 1352 2620 javaws.exe 1352 2996 msdtc.exe 1352 2988 UI0Detect.exe 1352 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kgvptlq = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\1DJVCN~1\\msdtc.exe" -
Processes:
rundll32.exejavaws.exemsdtc.exeUI0Detect.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA javaws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2880 rundll32.exe 2880 rundll32.exe 2880 rundll32.exe 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1352 wrote to memory of 2008 1352 30 PID 1352 wrote to memory of 2008 1352 30 PID 1352 wrote to memory of 2008 1352 30 PID 1352 wrote to memory of 2620 1352 31 PID 1352 wrote to memory of 2620 1352 31 PID 1352 wrote to memory of 2620 1352 31 PID 1352 wrote to memory of 2256 1352 32 PID 1352 wrote to memory of 2256 1352 32 PID 1352 wrote to memory of 2256 1352 32 PID 1352 wrote to memory of 2996 1352 33 PID 1352 wrote to memory of 2996 1352 33 PID 1352 wrote to memory of 2996 1352 33 PID 1352 wrote to memory of 2944 1352 34 PID 1352 wrote to memory of 2944 1352 34 PID 1352 wrote to memory of 2944 1352 34 PID 1352 wrote to memory of 2988 1352 35 PID 1352 wrote to memory of 2988 1352 35 PID 1352 wrote to memory of 2988 1352 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
C:\Windows\system32\javaws.exeC:\Windows\system32\javaws.exe1⤵PID:2008
-
C:\Users\Admin\AppData\Local\6S0zcWdOk\javaws.exeC:\Users\Admin\AppData\Local\6S0zcWdOk\javaws.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2620
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵PID:2256
-
C:\Users\Admin\AppData\Local\TMBXb9v\msdtc.exeC:\Users\Admin\AppData\Local\TMBXb9v\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2996
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵PID:2944
-
C:\Users\Admin\AppData\Local\cQmH8FaK\UI0Detect.exeC:\Users\Admin\AppData\Local\cQmH8FaK\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD5a8df89baba0cbd8ad1fc8a1c9dd7e635
SHA167dca2fc3a07da14c485bb3e67caa919c5187a22
SHA25622fe0f5ac9c49400cb8934052907b1c889cf56a9881ff2651c19baef7ab6bcfb
SHA512093a0e915bfeffe40979237981d309d088d3a7156bccefb337f41a981475d0cbbe0d7a1c88b75e610ac7e25574eed037eb76863dafae375a9793aa4e98f928f8
-
Filesize
700KB
MD5a659da8087195bbf6376071ccc8d7669
SHA19f3208affa442888ef10af19b3f14f8dfa1eb208
SHA256efcc72157ee16f3201b7565ab3625cd1226f0537f4468ddec1c5f50509d2a35e
SHA5124e13ec78f09a7cdf4ea07c3493e2a94abac651c9a7cc13e73a2a245c117acadd6495e48e7d56493ac1f261278655dfecf85847d2d0f638cba1d7f7d7fa389ede
-
Filesize
700KB
MD5e3165c57cb64265de1f0113d7896b531
SHA18fd247af9304238ee32769818c246277147b1553
SHA25614046fb27f33fa501bb82f0b330ec778276d9409dd1bc599e351b78b84f466bd
SHA51298f4978d82f73ff4e80a4ce5de339de988b547576d5bb89724e0acf7d7cd2e444b6d592091506ea46cd3f8455b68304e365c5b02b83c73e9ac1ba115f3318447
-
Filesize
1017B
MD5c70a26b5f6c56f9349ed77be26c86d3c
SHA1e1bef76298b1b32f282e1a56f6798f1a80f06c2c
SHA256323a5aa916996807c7fb37e4639a9747cb9862bba539fbb917330f27e3005ca9
SHA512a5958ee28e7cae91cb2731ae1ee57c5544c32520a9c4f7435e1e6123353147bf0adc7cdc4bed1f649b582c2c09552fa25200b8132e5949397373df327b023abb
-
Filesize
312KB
MD5f94bc1a70c942621c4279236df284e04
SHA18f46d89c7db415a7f48ccd638963028f63df4e4f
SHA256be9f8986a6c86d9f77978105d48b59eebfec3b9732dbf19e0f3d48bf7f20120c
SHA51260edf20ca3cae9802263446af266568d0b5e0692eddcfcfc3b2f9a39327b3184613ca994460b919d17a6edc5936b4da16d9033f5138bcfd9bc0f09d88c8dcd52
-
Filesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
Filesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d