Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
44eb5b41f8edc6879346d0d3761bdb52f663cc159491af145b0cf3fe5f9bbd7c.dll
Resource
win7-20241010-en
General
-
Target
44eb5b41f8edc6879346d0d3761bdb52f663cc159491af145b0cf3fe5f9bbd7c.dll
-
Size
696KB
-
MD5
97e6be25b172a40e98f8efb16c964feb
-
SHA1
4f42a6cab4d26118d7bfd69acc5b62f9c18b3936
-
SHA256
44eb5b41f8edc6879346d0d3761bdb52f663cc159491af145b0cf3fe5f9bbd7c
-
SHA512
3e69201be9918bbd2005b32296dfab4a9ab67ff9fc8970246afee3c740a6c86b2ebc4357612737af90618087f6a83790abf4ef5b3e815978f1cdcdcf9783693e
-
SSDEEP
12288:pqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:pqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3456-3-0x00000000024E0000-0x00000000024E1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/5080-0-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3456-23-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3456-35-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/5080-37-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3928-45-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3928-49-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/4360-65-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/2380-80-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
BitLockerWizard.exeslui.exeSystemPropertiesAdvanced.exepid process 3928 BitLockerWizard.exe 4360 slui.exe 2380 SystemPropertiesAdvanced.exe -
Loads dropped DLL 3 IoCs
Processes:
BitLockerWizard.exeslui.exeSystemPropertiesAdvanced.exepid process 3928 BitLockerWizard.exe 4360 slui.exe 2380 SystemPropertiesAdvanced.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fzrdqelbmr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\E2IxToDK\\slui.exe" -
Processes:
rundll32.exeBitLockerWizard.exeslui.exeSystemPropertiesAdvanced.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5080 rundll32.exe 5080 rundll32.exe 5080 rundll32.exe 5080 rundll32.exe 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3456 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3456 wrote to memory of 4676 3456 BitLockerWizard.exe PID 3456 wrote to memory of 4676 3456 BitLockerWizard.exe PID 3456 wrote to memory of 3928 3456 BitLockerWizard.exe PID 3456 wrote to memory of 3928 3456 BitLockerWizard.exe PID 3456 wrote to memory of 4788 3456 slui.exe PID 3456 wrote to memory of 4788 3456 slui.exe PID 3456 wrote to memory of 4360 3456 slui.exe PID 3456 wrote to memory of 4360 3456 slui.exe PID 3456 wrote to memory of 3364 3456 SystemPropertiesAdvanced.exe PID 3456 wrote to memory of 3364 3456 SystemPropertiesAdvanced.exe PID 3456 wrote to memory of 2380 3456 SystemPropertiesAdvanced.exe PID 3456 wrote to memory of 2380 3456 SystemPropertiesAdvanced.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44eb5b41f8edc6879346d0d3761bdb52f663cc159491af145b0cf3fe5f9bbd7c.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:4676
-
C:\Users\Admin\AppData\Local\CieDl\BitLockerWizard.exeC:\Users\Admin\AppData\Local\CieDl\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3928
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:4788
-
C:\Users\Admin\AppData\Local\FIpxSR\slui.exeC:\Users\Admin\AppData\Local\FIpxSR\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4360
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵PID:3364
-
C:\Users\Admin\AppData\Local\gF7Q9NxJf\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\gF7Q9NxJf\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
700KB
MD5b888dda0bc7a42f18852cc33589f8e4f
SHA12305a2e56e39f30bc1e17e54a76a8a0b19a6ff38
SHA25613085a2e481545b0e89555321277aad630668bf356f0a7239ec8d39e75a57e61
SHA512c251b045c0b62535c32ba06617010cae1a3c4c1faddf9f8bbc12e7e606e03a232fb1143349a862a165288c7baac516e1404c3eb2433c4dda3c8ef7c36fa7b5e7
-
Filesize
700KB
MD5179a4a5115451d887ebad260cb535dbe
SHA11f26bccc6055f6fb5b19a13d95a0a718d8d7a992
SHA25606a1c2c31c097ce06efbaced02ed231981063e8ff083b9c8c783d4fc0a7d0c5f
SHA512dbdc6416b0c1471328fb2de87c540e7f24a2045b147118783f1e2a2e2967a30092c1f3e4899a0a4f641fd2bd83498ddf0b6526a04870c46dd265aa4887c40a9b
-
Filesize
534KB
MD5eb725ea35a13dc18eac46aa81e7f2841
SHA1c0b3304c970324952e18c4a51073e3bdec73440b
SHA25625e7624d469a592934ab8c509d12c153c2799e604c2a4b8a83650a7268577dff
SHA51239192a1fad29654b3769f007298eff049d0688a3cb51390833ec563f44f9931cd3f6f8693db37b649b061b5aab379b166c15dade56d0fc414375243320375b26
-
Filesize
700KB
MD53f5d51764d16686e20ede833a4ea3271
SHA1d6885ba311e7244e25501677389ad04704163d8d
SHA256efd4e38e10c4892c474364de15525aa48f564900c671e5548fc5f4d90e8d3731
SHA512e856eac2b5bd5dc1f847f219421ddce4bd9252ac5acf30d93506c25739c69cc933b96b6197cb18d18d2afd7d3e8af3773defe6da6d286973cab13051007ffdd7
-
Filesize
82KB
MD5fa040b18d2d2061ab38cf4e52e753854
SHA1b1b37124e9afd6c860189ce4d49cebbb2e4c57bc
SHA256c61fa0f8c5d8d61110adbcceaa453a6c1d31255b3244dc7e3b605a4a931c245c
SHA512511f5981bd2c446f1f3039f6674f972651512305630bd688b1ef159af36a23cb836b43d7010b132a86b5f4d6c46206057abd31600f1e7dc930cb32ed962298a4
-
Filesize
1KB
MD574b50e1581c3929939653f9111b23ce3
SHA10eec372987e06ba79e68bcbd445e4386db32c480
SHA256107d045bd43eb870332f6b542d87abfad9727cf9db9d2592eff4466ce4ec0328
SHA512f4ddb37dc6a1d765cb7b95a7fc12992d77a79b62e9f58eb02465e0625f129c4584d138b1a50294b2b57f61dcd479404eac5cbe3d66cce647c7b7a07a09d194e9