Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
5a3f8dcfab8e9ee7abe3dad7a5a0685a088c108075cbc72f622b8511f79bbf63.dll
Resource
win7-20240903-en
General
-
Target
5a3f8dcfab8e9ee7abe3dad7a5a0685a088c108075cbc72f622b8511f79bbf63.dll
-
Size
972KB
-
MD5
f02061a30d702d2dab4bf5d0557a1587
-
SHA1
e155dc8cc21a6176969c38eacc5e0d5a8d15d452
-
SHA256
5a3f8dcfab8e9ee7abe3dad7a5a0685a088c108075cbc72f622b8511f79bbf63
-
SHA512
1bbbbd355f95fefc63758a4e45ad1a43ba03ef2e7629e0253a850924ca0a3fe0789cc7bc0c203b82b4f7004f09016ebad26ff431459bc3488986b785a46a4b5a
-
SSDEEP
12288:AqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4BaedTJqpq:AqGBHTxvt+g2gYedtu
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3492-3-0x00000000026E0000-0x00000000026E1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/3576-1-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral2/memory/3492-34-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral2/memory/3492-23-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral2/memory/3576-37-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral2/memory/3628-45-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload behavioral2/memory/3628-49-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload behavioral2/memory/1616-66-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload behavioral2/memory/4024-77-0x0000000140000000-0x00000001400F5000-memory.dmp dridex_payload behavioral2/memory/4024-81-0x0000000140000000-0x00000001400F5000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
msra.exemsinfo32.exePresentationSettings.exepid process 3628 msra.exe 1616 msinfo32.exe 4024 PresentationSettings.exe -
Loads dropped DLL 3 IoCs
Processes:
msra.exemsinfo32.exePresentationSettings.exepid process 3628 msra.exe 1616 msinfo32.exe 4024 PresentationSettings.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gbrhc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\AddIns\\o6r\\msinfo32.exe" -
Processes:
rundll32.exemsra.exemsinfo32.exePresentationSettings.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3576 rundll32.exe 3576 rundll32.exe 3576 rundll32.exe 3576 rundll32.exe 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 3492 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3492 Token: SeCreatePagefilePrivilege 3492 Token: SeShutdownPrivilege 3492 Token: SeCreatePagefilePrivilege 3492 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3492 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3492 wrote to memory of 852 3492 msra.exe PID 3492 wrote to memory of 852 3492 msra.exe PID 3492 wrote to memory of 3628 3492 msra.exe PID 3492 wrote to memory of 3628 3492 msra.exe PID 3492 wrote to memory of 3600 3492 msinfo32.exe PID 3492 wrote to memory of 3600 3492 msinfo32.exe PID 3492 wrote to memory of 1616 3492 msinfo32.exe PID 3492 wrote to memory of 1616 3492 msinfo32.exe PID 3492 wrote to memory of 5040 3492 PresentationSettings.exe PID 3492 wrote to memory of 5040 3492 PresentationSettings.exe PID 3492 wrote to memory of 4024 3492 PresentationSettings.exe PID 3492 wrote to memory of 4024 3492 PresentationSettings.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a3f8dcfab8e9ee7abe3dad7a5a0685a088c108075cbc72f622b8511f79bbf63.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:852
-
C:\Users\Admin\AppData\Local\vz7zzNlTn\msra.exeC:\Users\Admin\AppData\Local\vz7zzNlTn\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3628
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵PID:3600
-
C:\Users\Admin\AppData\Local\F7mh\msinfo32.exeC:\Users\Admin\AppData\Local\F7mh\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1616
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵PID:5040
-
C:\Users\Admin\AppData\Local\02pI7\PresentationSettings.exeC:\Users\Admin\AppData\Local\02pI7\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5790799a168c41689849310f6c15f98fa
SHA1a5d213fc1c71a56de9441b2e35411d83770c01ec
SHA2566e59ab1a0b4ac177dc3397a54afcf68fcea3c1ee72c33bd08c89f04a6dac64b8
SHA5128153b79d4681f21ade7afe995841c386bff8e491ad347f8e7c287df5f9053cae7458e273339146d9a920ceaa2ba0f41cc793d7b2c0fa80efbb41477d39470866
-
Filesize
980KB
MD5560af09186b43023d3965953cd6448da
SHA18c87e56cced34d5f7d8c6955391ea40f0cb19fc6
SHA25679c39bd1a051ae9eed741313f7ab9ee5a9df422ea54861d5f145983bb1959185
SHA512bf3d80fdca9d07503a5db6e7d9ae30e787438954f85311c24982e2283dfb8f98b1e180fa03c1227f80e415832e64e81233ceea4884594e62ca66c2766627d028
-
Filesize
976KB
MD523d4cdcf2917b69891e1c0e92abcc27e
SHA15f78068b1f003c018a18d1becebdb89b392e372e
SHA2562752ca21053d56893cb922ad8ed1eace715e8717f8aa040500bd907cb95d3abf
SHA512dd03e2a80fdef0c7dd2202dc43a1f76173ca4566fea415803914da52790d465e8094b17b636c348fa64b2a0b3f3da868a9780555570c19733fcf377d7c581367
-
Filesize
376KB
MD50aed91da63713bf9f881b03a604a1c9d
SHA1b1b2d292cb1a4c13dc243b5eab13afb316a28b9a
SHA2565cf1604d2473661266e08fc0e4e144ea98f99b7584c43585eb2b01551130fd14
SHA51204bca9b321d702122b6e72c2ad15b7cd98924e5dfc3b8dd0e907ea28fd7826d3f72b98c67242b6698594df648d3c2b6b0952bb52a2363b687bbe44a66e830c03
-
Filesize
976KB
MD5f277e100b7decf60b57b762481c04d32
SHA14549e5436035458c68efda8a6e70065a9d248162
SHA256dc5a9e37e0a2b6fb2ed191b6b6c106aeb64e6009ff4d4c3306e5e3e4967d86d5
SHA5121dba1fe533113ce0c0485eb9397f34c57967f4f32f07df8603fa229c95b3e7fe150c34e80bee371a7bf39bf04f53f0fbb9e123e0cd7550658c80f7b30bc3e8b0
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
1KB
MD554a05cfc68d5a225327bca993b36f705
SHA1ea4c0d6a7fa221236c945950d632a7e44bb6367e
SHA25693566f9b580eb21264772ccf2682def2860ea541def92d3be5b869cbd77f7912
SHA512a68301968c6cfd815d0278df2ff1d7a427308572320ca4cdca54bf52a1a97a67d62c9fb8eeea4b14f2da66f51a4753726debfec2cdf9c72072aa83f727be8115