Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll
Resource
win7-20240903-en
General
-
Target
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll
-
Size
692KB
-
MD5
e9531680b8f5142d44285991f2709e0a
-
SHA1
45d9e59a69ddade77a8f3b4f0edb6deb18e8d3b6
-
SHA256
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa
-
SHA512
dbb8b8208e7f6ebf90a715963d9fdbfdb29c66ce079c9b805f116064e5ffbd334f5ef958279460ac3193a1610eca25d90f7e63c078b0e70369c2d0bef3262617
-
SSDEEP
12288:AqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:AqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3448-3-0x0000000002E50000-0x0000000002E51000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/2872-0-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3448-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3448-33-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/2872-36-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/4752-52-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/4752-56-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/1028-67-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral2/memory/1028-71-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral2/memory/4872-82-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/4872-86-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
Processes:
consent.exewusa.exeWindowsActionDialog.exeWFS.exepid process 2580 consent.exe 4752 wusa.exe 1028 WindowsActionDialog.exe 4872 WFS.exe -
Loads dropped DLL 3 IoCs
Processes:
wusa.exeWindowsActionDialog.exeWFS.exepid process 4752 wusa.exe 1028 WindowsActionDialog.exe 4872 WFS.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pzfwfhktmuesbir = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\PRINTE~1\\MGCAX2~1\\WINDOW~1.EXE" -
Processes:
WindowsActionDialog.exeWFS.exerundll32.exewusa.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsActionDialog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2872 rundll32.exe 2872 rundll32.exe 2872 rundll32.exe 2872 rundll32.exe 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
pid process 3448 3448 3448 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 3448 3448 3448 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3448 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid process target process PID 3448 wrote to memory of 5040 3448 consent.exe PID 3448 wrote to memory of 5040 3448 consent.exe PID 3448 wrote to memory of 2580 3448 consent.exe PID 3448 wrote to memory of 2580 3448 consent.exe PID 3448 wrote to memory of 1288 3448 wusa.exe PID 3448 wrote to memory of 1288 3448 wusa.exe PID 3448 wrote to memory of 4752 3448 wusa.exe PID 3448 wrote to memory of 4752 3448 wusa.exe PID 3448 wrote to memory of 3156 3448 WindowsActionDialog.exe PID 3448 wrote to memory of 3156 3448 WindowsActionDialog.exe PID 3448 wrote to memory of 1028 3448 WindowsActionDialog.exe PID 3448 wrote to memory of 1028 3448 WindowsActionDialog.exe PID 3448 wrote to memory of 4856 3448 WFS.exe PID 3448 wrote to memory of 4856 3448 WFS.exe PID 3448 wrote to memory of 4872 3448 WFS.exe PID 3448 wrote to memory of 4872 3448 WFS.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:5040
-
C:\Users\Admin\AppData\Local\meKPP\consent.exeC:\Users\Admin\AppData\Local\meKPP\consent.exe1⤵
- Executes dropped EXE
PID:2580
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:1288
-
C:\Users\Admin\AppData\Local\4qWa\wusa.exeC:\Users\Admin\AppData\Local\4qWa\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4752
-
C:\Windows\system32\WindowsActionDialog.exeC:\Windows\system32\WindowsActionDialog.exe1⤵PID:3156
-
C:\Users\Admin\AppData\Local\WF8m\WindowsActionDialog.exeC:\Users\Admin\AppData\Local\WF8m\WindowsActionDialog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1028
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵PID:4856
-
C:\Users\Admin\AppData\Local\87h\WFS.exeC:\Users\Admin\AppData\Local\87h\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD525a58e1561bef8a3a9e02a36cbde6bd9
SHA156de31be4f68874a5f31bd4e69ab30600fdd57ee
SHA256cc9de7474ee560211b1053f4fd99e79fc53d50f382fe2bbeff15c6055a71d468
SHA512db29bf59ba6340793e4bd98df8b28b2de8980aa431a6d73d019de0850a5d26b591d6a547ba89c49591f9d880aeb14e3d1c3e4827ad14f8957a1d2b0d63c2fd00
-
Filesize
309KB
MD5e43499ee2b4cf328a81bace9b1644c5d
SHA1b2b55641f2799e3fdb3bea709c9532017bbac59d
SHA2563e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb
SHA51204823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b
-
Filesize
944KB
MD53cbc8d0f65e3db6c76c119ed7c2ffd85
SHA1e74f794d86196e3bbb852522479946cceeed7e01
SHA256e23e4182efe7ed61aaf369696e1ce304c3818df33d1663872b6d3c75499d81f4
SHA51226ae5845a804b9eb752078f1ffa80a476648a8a9508b4f7ba56c94acd4198f3ba59c77add4feb7e0420070222af56521ca5f6334f466d5db272c816930513f0a
-
Filesize
700KB
MD5cf2b66b356343a9eee9bf788ceb11069
SHA11068bce2bc016bab7415b1d0a3427b3c96406ca3
SHA256f2a4c1187c63a70ab0d89469bfc9bf694820bcb8d557369ce235688ca967a416
SHA51294699909b7b529de65f3ba01f473f04e0382af116a34f7a55931d6ac7e70a92dfd7de0d2c8f418d6ecd8b76313276ffbefe34fe6069148a98bdad954f686e5c0
-
Filesize
972KB
MD57166cde56420a7405bc40f1bfc4dc428
SHA1d5f4a3dc7362fccad4159aacfbf29e9f189b248e
SHA256f1c689623deed7940c70faaa8e546a8a2bfde22483a004dabae76d3f993cfc38
SHA512d9402a9444792f7a41b487249c6093a751a707cee40f38b9ebb8a7add6db7c0fe11d7006883f75005f53e7feaaf63271859a91f6ab3d830b003797b65bda6c26
-
Filesize
61KB
MD573c523b6556f2dc7eefc662338d66f8d
SHA11e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5
SHA2560c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31
SHA51269d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912
-
Filesize
162KB
MD56646631ce4ad7128762352da81f3b030
SHA11095bd4b63360fc2968d75622aa745e5523428ab
SHA25656b2d516376328129132b815e22379ae8e7176825f059c9374a33cc844482e64
SHA5121c00ed5d8568f6ebd119524b61573cfe71ca828bd8fbdd150158ec8b5db65fa066908d120d201fce6222707bcb78e0c1151b82fdc1dccf3ada867cb810feb6da
-
Filesize
714B
MD5001c8b264d69a54bad1b4f19ece04188
SHA1dfc9991c1abeab91e7827881adcf8ebd51a4b7c9
SHA256ff7f9bf42581c8c6021cb259eb319b4394ea93ee7d4d95b051930e488901a16a
SHA5128c650a069a9df095eeedf44c6d041e9923ce29e2116e058c8c66f2856a95bfc021e428e0e128d149d411ba7fc508c899c2f282e9ae60f2263c220f90baa87d0c