Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
44eb5b41f8edc6879346d0d3761bdb52f663cc159491af145b0cf3fe5f9bbd7c.dll
Resource
win7-20241010-en
General
-
Target
44eb5b41f8edc6879346d0d3761bdb52f663cc159491af145b0cf3fe5f9bbd7c.dll
-
Size
696KB
-
MD5
97e6be25b172a40e98f8efb16c964feb
-
SHA1
4f42a6cab4d26118d7bfd69acc5b62f9c18b3936
-
SHA256
44eb5b41f8edc6879346d0d3761bdb52f663cc159491af145b0cf3fe5f9bbd7c
-
SHA512
3e69201be9918bbd2005b32296dfab4a9ab67ff9fc8970246afee3c740a6c86b2ebc4357612737af90618087f6a83790abf4ef5b3e815978f1cdcdcf9783693e
-
SSDEEP
12288:pqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:pqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-4-0x0000000002A80000-0x0000000002A81000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2044-0-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1200-23-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1200-35-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1200-34-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2044-43-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1356-54-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1356-57-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2696-74-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1700-90-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
rekeywiz.exeNetplwiz.exePresentationSettings.exepid process 1356 rekeywiz.exe 2696 Netplwiz.exe 1700 PresentationSettings.exe -
Loads dropped DLL 7 IoCs
Processes:
rekeywiz.exeNetplwiz.exePresentationSettings.exepid process 1200 1356 rekeywiz.exe 1200 2696 Netplwiz.exe 1200 1700 PresentationSettings.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kgvptlq = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\Joh\\Netplwiz.exe" -
Processes:
PresentationSettings.exerundll32.exerekeywiz.exeNetplwiz.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1200 wrote to memory of 2768 1200 rekeywiz.exe PID 1200 wrote to memory of 2768 1200 rekeywiz.exe PID 1200 wrote to memory of 2768 1200 rekeywiz.exe PID 1200 wrote to memory of 1356 1200 rekeywiz.exe PID 1200 wrote to memory of 1356 1200 rekeywiz.exe PID 1200 wrote to memory of 1356 1200 rekeywiz.exe PID 1200 wrote to memory of 2668 1200 Netplwiz.exe PID 1200 wrote to memory of 2668 1200 Netplwiz.exe PID 1200 wrote to memory of 2668 1200 Netplwiz.exe PID 1200 wrote to memory of 2696 1200 Netplwiz.exe PID 1200 wrote to memory of 2696 1200 Netplwiz.exe PID 1200 wrote to memory of 2696 1200 Netplwiz.exe PID 1200 wrote to memory of 2096 1200 PresentationSettings.exe PID 1200 wrote to memory of 2096 1200 PresentationSettings.exe PID 1200 wrote to memory of 2096 1200 PresentationSettings.exe PID 1200 wrote to memory of 1700 1200 PresentationSettings.exe PID 1200 wrote to memory of 1700 1200 PresentationSettings.exe PID 1200 wrote to memory of 1700 1200 PresentationSettings.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44eb5b41f8edc6879346d0d3761bdb52f663cc159491af145b0cf3fe5f9bbd7c.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵PID:2768
-
C:\Users\Admin\AppData\Local\1gm\rekeywiz.exeC:\Users\Admin\AppData\Local\1gm\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1356
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:2668
-
C:\Users\Admin\AppData\Local\mn7\Netplwiz.exeC:\Users\Admin\AppData\Local\mn7\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2696
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵PID:2096
-
C:\Users\Admin\AppData\Local\aGpedy\PresentationSettings.exeC:\Users\Admin\AppData\Local\aGpedy\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD5da4fe91a4699db9ddff89c3c4807f86c
SHA1a9ed25369307b03dbb9f19750f9bb90658f72bad
SHA256da4cec7fda932683d3ead598d6754c12715df48f1cfc3ad1969bc56844fd42e8
SHA5124b79db6465ad91628d1bd544b9f2d569bddab64834c3c6b498b9e4a1cf065352d274f72d85533e2bcd4ec184da28475289d5e1f8064219bfabd2fe3bd3e2244c
-
Filesize
700KB
MD584204d487981b6d1bc2574d0884d08a7
SHA150583407c881f8714b40ddf87e68a50ceefc6199
SHA2564b477fe273ea6781e17aec3d2f4cb8867956433f5eecdeac7e69554fbd891a24
SHA51242e625a63b5e2696ec4518d184c50d0460a173bed18098a5c3b0292a3219bb9cd4290d7686413ca4849c1435783db7013712f8f921a40f93e9bd2c89d34079ea
-
Filesize
700KB
MD5a56b15be40d5c0e3554d55e8a126d67e
SHA1c807e380b9bc68b4bd23c872318ac643f6fde824
SHA256d6d32ddb91c963a0e2f11f72f9545e0b18f93647d06ca6390c49fee1bfdb2bfa
SHA51293db46e499cf7f8dd500f9445d5225bc402e487d5b43b6a0af127ece6e9f2746ce9cc58af0d814d0fcb3bd830103bf99ddae128cf15dc227a1d22ce44e10cb7f
-
Filesize
1KB
MD5b18640e0a7cc0ee6eef70c2c1191b32e
SHA10027288ba4cbd1c9da686beb804e0906ae3fe209
SHA2564bc521d2f1c62ad516bafe13d71faa71c18ad61086451d14b9cb288cb31bfb16
SHA512bfaf0cdf257a03c1831c3bb71deb386a33c19344126f0945d358f386376b8dfff7767d39b6eaae06b33c3fa1bc578e40772d01d6039b72607a32346483816888
-
Filesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
Filesize
172KB
MD5a6f8d318f6041334889481b472000081
SHA1b8cf08ec17b30c8811f2514246fcdff62731dd58
SHA256208b94fd66a6ce266c3195f87029a41a0622fff47f2a5112552cb087adbb1258
SHA51260f70fa8a19e6ea6f08f4907dd7fede3665ad3f2e013d49f6649442ea5871a967b9a53ec4d3328a06cb83b69be1b7af1bb14bf122b568bd1f8432ee1d0bfee69
-
Filesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08