Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll
Resource
win7-20240903-en
General
-
Target
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll
-
Size
692KB
-
MD5
e9531680b8f5142d44285991f2709e0a
-
SHA1
45d9e59a69ddade77a8f3b4f0edb6deb18e8d3b6
-
SHA256
4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa
-
SHA512
dbb8b8208e7f6ebf90a715963d9fdbfdb29c66ce079c9b805f116064e5ffbd334f5ef958279460ac3193a1610eca25d90f7e63c078b0e70369c2d0bef3262617
-
SSDEEP
12288:AqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:AqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3488-3-0x0000000002720000-0x0000000002721000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/936-2-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3488-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3488-33-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/936-36-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/1660-43-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/1660-48-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/4720-61-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/4720-66-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/2704-81-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
ApplySettingsTemplateCatalog.exeeudcedit.exeBitLockerWizardElev.exepid Process 1660 ApplySettingsTemplateCatalog.exe 4720 eudcedit.exe 2704 BitLockerWizardElev.exe -
Loads dropped DLL 3 IoCs
Processes:
ApplySettingsTemplateCatalog.exeeudcedit.exeBitLockerWizardElev.exepid Process 1660 ApplySettingsTemplateCatalog.exe 4720 eudcedit.exe 2704 BitLockerWizardElev.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qiqbxsgjw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\gr7fnMaa\\eudcedit.exe" -
Processes:
rundll32.exeApplySettingsTemplateCatalog.exeeudcedit.exeBitLockerWizardElev.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplySettingsTemplateCatalog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3488 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3488 wrote to memory of 2072 3488 94 PID 3488 wrote to memory of 2072 3488 94 PID 3488 wrote to memory of 1660 3488 95 PID 3488 wrote to memory of 1660 3488 95 PID 3488 wrote to memory of 2088 3488 96 PID 3488 wrote to memory of 2088 3488 96 PID 3488 wrote to memory of 4720 3488 97 PID 3488 wrote to memory of 4720 3488 97 PID 3488 wrote to memory of 2936 3488 98 PID 3488 wrote to memory of 2936 3488 98 PID 3488 wrote to memory of 2704 3488 99 PID 3488 wrote to memory of 2704 3488 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c0249819c9ceee38ab90401687c1f349ae91e260f8323835b0388504402e8aa.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:936
-
C:\Windows\system32\ApplySettingsTemplateCatalog.exeC:\Windows\system32\ApplySettingsTemplateCatalog.exe1⤵PID:2072
-
C:\Users\Admin\AppData\Local\2BskaLq\ApplySettingsTemplateCatalog.exeC:\Users\Admin\AppData\Local\2BskaLq\ApplySettingsTemplateCatalog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1660
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:2088
-
C:\Users\Admin\AppData\Local\KKnbZdI\eudcedit.exeC:\Users\Admin\AppData\Local\KKnbZdI\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4720
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵PID:2936
-
C:\Users\Admin\AppData\Local\1nGCWvkg4\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\1nGCWvkg4\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD58ac5a3a20cf18ae2308c64fd707eeb81
SHA131f2f0bdc2eb3e0d2a6cd626ea8ed71262865544
SHA256803eb37617d450704766cb167dc9766e82102a94940a26a988ad26ab8be3f2f5
SHA51285d0e28e4bffec709f26b2f0d20eb76373134af43bcaa70b97a03efa273b77dd4fbd4f6ee026774ce4029ab5a983aea057111efcd234ab1686a9bd0f7202748b
-
Filesize
696KB
MD56483a9093b1191ac5ce427ac72561f74
SHA1a920c4e9b73af2831b6f257071827e824519792c
SHA25639c6a96cb01e31e6743732c5319ce76ce34692a913f0f3b52a7c87bfc945002a
SHA5127737946c7da2d1f2cb4f4a1f83d9688e9ed229a98f67076ec764e9a9c25e8a767498001075356f7e431efba3abf7911a6a67cb011fb66812f831934bf2be0e73
-
Filesize
696KB
MD59fe1b0f823549c0a1174625304440f32
SHA1ecfd01a5b8610265b24ab6a46df58e75cd73243d
SHA256fc529f5dfb9114b82a39a0b68271c1a9d3e2ff0815a3bb21da9527bdc145a01b
SHA512f0e4df158a5b1d6b32896c266f5a22e8d1432afebaace945fea8338344b2ce39fde1851840302f199325fc09a5462654e00c28e3e625557b622601e9979b67f4
-
Filesize
1.1MB
MD513af41b1c1c53c7360cd582a82ec2093
SHA17425f893d1245e351483ab4a20a5f59d114df4e1
SHA256a462f29efaaa3c30411e76f32608a2ba5b7d21af3b9804e5dda99e342ba8c429
SHA512c7c82acef623d964c520f1a458dbfe34099981de0b781fb56e14b1f82632e3a8437db6434e7c20988aa3b39efde47aab8d188e80845e841a13e74b079285706a
-
Filesize
720KB
MD5d57798aeea44f7f00760b4ab4a0d6e72
SHA11fa99becdd63a24b8ca5ed4e144125ff1fc962f7
SHA25681e37e2c5dad7321cf6d9c4858921f85f715cf7c3c68cc1ac17f6bc0977e68aa
SHA5122514b19079e4d9181a5838670283957b63463917a54f7a5a8d62c76e294f6648de4d2ed89dc3af6a9b64522ae7cc12a9c0300e44ce4ba492f2b47a620c11d4d9
-
Filesize
365KB
MD5a9de6557179d371938fbe52511b551ce
SHA1def460b4028788ded82dc55c36cb0df28599fd5f
SHA25683c8d1a7582b24b4bbc0d453c813487185c2b05c483bd1759ef647a7e7e92dfe
SHA5125790cac8dae16a785b48f790e6645b137f211c1587fb64ea88e743b846ff3a886324afcfef4bebc61f869023b9a22ba925c461dfb2e12497b70f501e6b79153c
-
Filesize
1KB
MD5a5b948eec09621080d8e25e1a9a3e31e
SHA1013ae663ad2d67cac7703906d53bb3ebc66740ba
SHA256aae84c71960faea00e3f1bda219529d1cae9cd136eb42c1ccd0787371177f425
SHA51292c9014cf06d1a2c2192f1bcd1dd0020cc1a1e8f7d0fe84d1e40142bcfadd52537884ce0633704748addba382439f35c77902b5a94f1040d115e40ee3da84520