Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 14:40
Static task
static1
Behavioral task
behavioral1
Sample
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll
Resource
win7-20240903-en
General
-
Target
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll
-
Size
692KB
-
MD5
65411740b33c7475d67552a92d3c4054
-
SHA1
d1191e086f3faa2f2168a28eac66d7360c94d5e9
-
SHA256
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447
-
SHA512
3bdb279bba9946af41d4bccc9b2bed4c8f37fc03d0cc53d0845311645ba39d6a30ca0e8d6bbe7bc8a1d94c8cacaeb8f515686b226e59b8ec06f6d6242c85fb03
-
SSDEEP
12288:cqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:cqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1232-4-0x0000000002D80000-0x0000000002D81000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2256-0-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1232-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1232-33-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1232-35-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/2256-42-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/2612-52-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2612-56-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/352-73-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2880-89-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
spreview.exeperfmon.exeSystemPropertiesHardware.exepid process 2612 spreview.exe 352 perfmon.exe 2880 SystemPropertiesHardware.exe -
Loads dropped DLL 7 IoCs
Processes:
spreview.exeperfmon.exeSystemPropertiesHardware.exepid process 1232 2612 spreview.exe 1232 352 perfmon.exe 1232 2880 SystemPropertiesHardware.exe 1232 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CTLs\\TA\\perfmon.exe" -
Processes:
rundll32.exespreview.exeperfmon.exeSystemPropertiesHardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2256 rundll32.exe 2256 rundll32.exe 2256 rundll32.exe 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1232 wrote to memory of 2000 1232 spreview.exe PID 1232 wrote to memory of 2000 1232 spreview.exe PID 1232 wrote to memory of 2000 1232 spreview.exe PID 1232 wrote to memory of 2612 1232 spreview.exe PID 1232 wrote to memory of 2612 1232 spreview.exe PID 1232 wrote to memory of 2612 1232 spreview.exe PID 1232 wrote to memory of 1496 1232 perfmon.exe PID 1232 wrote to memory of 1496 1232 perfmon.exe PID 1232 wrote to memory of 1496 1232 perfmon.exe PID 1232 wrote to memory of 352 1232 perfmon.exe PID 1232 wrote to memory of 352 1232 perfmon.exe PID 1232 wrote to memory of 352 1232 perfmon.exe PID 1232 wrote to memory of 3000 1232 SystemPropertiesHardware.exe PID 1232 wrote to memory of 3000 1232 SystemPropertiesHardware.exe PID 1232 wrote to memory of 3000 1232 SystemPropertiesHardware.exe PID 1232 wrote to memory of 2880 1232 SystemPropertiesHardware.exe PID 1232 wrote to memory of 2880 1232 SystemPropertiesHardware.exe PID 1232 wrote to memory of 2880 1232 SystemPropertiesHardware.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵PID:2000
-
C:\Users\Admin\AppData\Local\sjwAnG\spreview.exeC:\Users\Admin\AppData\Local\sjwAnG\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2612
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:1496
-
C:\Users\Admin\AppData\Local\ZUpC\perfmon.exeC:\Users\Admin\AppData\Local\ZUpC\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:352
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵PID:3000
-
C:\Users\Admin\AppData\Local\IjJ0s\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\IjJ0s\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5a4de876f1524b4c828545d7ec61fc883
SHA14509f42ad82dab6ac9a5a827d410a4f56ec6b684
SHA256e6f11734d4651383a450e80511ad1f54ae130bf4485087aa4f89558bb7711e83
SHA51269314b355e0e4993a108e845df36aceb0158e778fe399c5e1068c37056d30afa07640de41f009477f4c07f53329c863bfe456ea8f77614147c90c4a3a6d047a7
-
Filesize
696KB
MD50da61d1a0ba52e5dcd150bc6c7783ac3
SHA1226cfe2c0c83821077233a4b6130c85ba603a0df
SHA256999530410761a07363f9876865df66dbb06c06ebc1163782a532b5dc4d23cd96
SHA51235be08ae1c3dd46fad76792c82fb440fdb633ad37593d7b3c85cef73f9faf21327a6489b1f14dca81b6c5a926f23ff233a5ff9b9c18157e8a37a81db5e93aa1d
-
Filesize
696KB
MD5965398f6768a6c7a2ed72b4615623545
SHA106e9546344d964250ad66046490fa31a6fffcf06
SHA256f5ce65d8db12d9db8a8c8a9b37675b83fe2b610bcc27c6e3899a9a4218fdb056
SHA512a55a2916d9c4244c2232dd24978bc4cac6ec9d9aaf4b3d2c01ebd78f0c17bb501da4cb267bf6afa618445454d32a0d9a1fd2352725653e3ee42746eb8e38b2ee
-
Filesize
1KB
MD56f40adb374239d193841720cf482809f
SHA16c3576bac582ae295aa35ee0c40ff194ccc71a69
SHA25691d0355556f9ce14c0cef054e911b114f1d57d1d72ee1a65520801ab6a723a30
SHA5126ad6ea6eacd315b77037b638a2541e179f3f7b83ea8a3d39fdf8c089a567f7cc5436d7a567a568d83451503de2261b6cf4b025b3e41aa40084b2736308838ed6
-
Filesize
80KB
MD5c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee