Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll
Resource
win7-20240903-en
General
-
Target
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll
-
Size
692KB
-
MD5
e9531680b8f5142d44285991f2709e0a
-
SHA1
45d9e59a69ddade77a8f3b4f0edb6deb18e8d3b6
-
SHA256
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa
-
SHA512
dbb8b8208e7f6ebf90a715963d9fdbfdb29c66ce079c9b805f116064e5ffbd334f5ef958279460ac3193a1610eca25d90f7e63c078b0e70369c2d0bef3262617
-
SSDEEP
12288:AqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:AqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1180-4-0x0000000002D50000-0x0000000002D51000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2416-0-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1180-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1180-35-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1180-34-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/2416-42-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/2748-52-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2748-56-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2296-73-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2936-88-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
msconfig.exeSndVol.exeicardagt.exepid process 2748 msconfig.exe 2296 SndVol.exe 2936 icardagt.exe -
Loads dropped DLL 7 IoCs
Processes:
msconfig.exeSndVol.exeicardagt.exepid process 1180 2748 msconfig.exe 1180 2296 SndVol.exe 1180 2936 icardagt.exe 1180 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dnfwvyvycst = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\9.0\\eIu\\SndVol.exe" -
Processes:
msconfig.exeSndVol.exeicardagt.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2416 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1180 wrote to memory of 2904 1180 msconfig.exe PID 1180 wrote to memory of 2904 1180 msconfig.exe PID 1180 wrote to memory of 2904 1180 msconfig.exe PID 1180 wrote to memory of 2748 1180 msconfig.exe PID 1180 wrote to memory of 2748 1180 msconfig.exe PID 1180 wrote to memory of 2748 1180 msconfig.exe PID 1180 wrote to memory of 2176 1180 SndVol.exe PID 1180 wrote to memory of 2176 1180 SndVol.exe PID 1180 wrote to memory of 2176 1180 SndVol.exe PID 1180 wrote to memory of 2296 1180 SndVol.exe PID 1180 wrote to memory of 2296 1180 SndVol.exe PID 1180 wrote to memory of 2296 1180 SndVol.exe PID 1180 wrote to memory of 2700 1180 icardagt.exe PID 1180 wrote to memory of 2700 1180 icardagt.exe PID 1180 wrote to memory of 2700 1180 icardagt.exe PID 1180 wrote to memory of 2936 1180 icardagt.exe PID 1180 wrote to memory of 2936 1180 icardagt.exe PID 1180 wrote to memory of 2936 1180 icardagt.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:2904
-
C:\Users\Admin\AppData\Local\qno3ClS\msconfig.exeC:\Users\Admin\AppData\Local\qno3ClS\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2748
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:2176
-
C:\Users\Admin\AppData\Local\G2HP3\SndVol.exeC:\Users\Admin\AppData\Local\G2HP3\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2296
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵PID:2700
-
C:\Users\Admin\AppData\Local\HABzonCR\icardagt.exeC:\Users\Admin\AppData\Local\HABzonCR\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5be528090560026b46bf97945c48e1d03
SHA156d48813dfe47739f6f23248cca1cf64e0723930
SHA256f5768356ec95e6d328be230fb9d1b00aa450cd81ff4895b2ae2d39cc46f7b131
SHA512adbc74661e398dcd41812a8dabe2191aadf1787f554aaf616f2894a264c04a4f9620cba52a2a4af096ebac2f3ad7a81aa89bb6f98cece794ea6aca80f4eb8626
-
Filesize
696KB
MD5bcc02ac940f332995e9cb6363d817572
SHA15e69769d0577ffd4331f618b2c9b97ab99f86b51
SHA256dd1c63de5a0de4f65a96a455d14607922ebeb3ce9d132647ba859c6c0013f655
SHA51222a35e329a6a1be8e78b19e8034c98c589ea2b1fc718ef149c0eb9a1db07dd1c4e65e0a9dff20db386d914aa53212abcfdbdcae009ca4e85f4562eb6e508a26d
-
Filesize
1.3MB
MD52fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
Filesize
696KB
MD52758521234dd8fe48ada74f1935d4d75
SHA13ab9a40ffdb3e38427d2147da610423a05bdc3bf
SHA25626c32be18592dbfab06edb9ba7b181b5956a10299290a256690574fea2659052
SHA512e879cd5099d386e304e1a2ff4ccae2f1c34a7cc82e73c3d8ffd4fdfd4ea2def1d69ebf5a666517c0099d7b84547040c5caecab58a8f97470fddff04dc341c081
-
Filesize
1KB
MD5d3f52805b2e807c33888e63d0bc79146
SHA1890eeb648189a93bd8073289b5a8e4aac8aaf8c8
SHA256ed1a51645613227ec39dfaef05424fff8cd66f9ee14551406d02ead02fd01dd0
SHA51248c3a86a0fd40ff4d430b2c920545ea369e38ca35770d63ff73c61bae0b886ebddfa1527440cd420af2112609fe067cba1034ddbc73227d9e2005564922b3522
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283