Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 14:40
Static task
static1
Behavioral task
behavioral1
Sample
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll
Resource
win7-20240903-en
General
-
Target
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll
-
Size
692KB
-
MD5
65411740b33c7475d67552a92d3c4054
-
SHA1
d1191e086f3faa2f2168a28eac66d7360c94d5e9
-
SHA256
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447
-
SHA512
3bdb279bba9946af41d4bccc9b2bed4c8f37fc03d0cc53d0845311645ba39d6a30ca0e8d6bbe7bc8a1d94c8cacaeb8f515686b226e59b8ec06f6d6242c85fb03
-
SSDEEP
12288:cqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:cqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3444-3-0x00000000024E0000-0x00000000024E1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1064-1-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3444-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3444-33-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/1064-36-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3368-44-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral2/memory/3368-48-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral2/memory/4224-60-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/4224-64-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/2552-79-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
bdechangepin.exerdpshell.exeCloudNotifications.exepid Process 3368 bdechangepin.exe 4224 rdpshell.exe 2552 CloudNotifications.exe -
Loads dropped DLL 3 IoCs
Processes:
bdechangepin.exerdpshell.exeCloudNotifications.exepid Process 3368 bdechangepin.exe 4224 rdpshell.exe 2552 CloudNotifications.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fzrdqelbmr = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\gV3w1EaP\\rdpshell.exe" -
Processes:
rundll32.exebdechangepin.exerdpshell.exeCloudNotifications.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdechangepin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1064 rundll32.exe 1064 rundll32.exe 1064 rundll32.exe 1064 rundll32.exe 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3444 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3444 wrote to memory of 884 3444 98 PID 3444 wrote to memory of 884 3444 98 PID 3444 wrote to memory of 3368 3444 99 PID 3444 wrote to memory of 3368 3444 99 PID 3444 wrote to memory of 808 3444 100 PID 3444 wrote to memory of 808 3444 100 PID 3444 wrote to memory of 4224 3444 101 PID 3444 wrote to memory of 4224 3444 101 PID 3444 wrote to memory of 3124 3444 102 PID 3444 wrote to memory of 3124 3444 102 PID 3444 wrote to memory of 2552 3444 103 PID 3444 wrote to memory of 2552 3444 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
C:\Windows\system32\bdechangepin.exeC:\Windows\system32\bdechangepin.exe1⤵PID:884
-
C:\Users\Admin\AppData\Local\IW3BeSC0\bdechangepin.exeC:\Users\Admin\AppData\Local\IW3BeSC0\bdechangepin.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3368
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:808
-
C:\Users\Admin\AppData\Local\M1h1vBQk\rdpshell.exeC:\Users\Admin\AppData\Local\M1h1vBQk\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4224
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵PID:3124
-
C:\Users\Admin\AppData\Local\fgM\CloudNotifications.exeC:\Users\Admin\AppData\Local\fgM\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
972KB
MD56441774fad84c1c360d5f1ce17e5ffdb
SHA13c990fcbf532e726da44b3afd9c64a38d2c4ff1e
SHA25657cd847b6f919ee5ae7dd3becf19c26133f77158afd9efb66e2cd478d0177f87
SHA512f54e6f970e305842944d7ee2420dac95fb7aacfbafce5d80bcc17d274a7ce965c5aac0ac5c1f42704f6f20b4271c4eb1da6483c4f45737a8147497c1029ce3af
-
Filesize
373KB
MD5601a28eb2d845d729ddd7330cbae6fd6
SHA15cf9f6f9135c903d42a7756c638333db8621e642
SHA2564d43f37576a0ebbaf97024cd5597d968ffe59c871b483554aea302dccb7253f6
SHA5121687044612ceb705f79c806b176f885fd01449251b0097c2df70280b7d10a2b830ee30ac0f645a7e8d8067892f6562d933624de694295e22318863260222859d
-
Filesize
696KB
MD5e0a6f93374258719cec4ca44e0755d11
SHA13e1c026d68241e527d6481197c07110f74324c3e
SHA256d2b84f7387530a6f7ec6cc0b0f7b0fe99e3c327a5a40c85f435e780a6b7e757a
SHA512d9853d09009540d45010a3578fb55695a8d4883fa93580243c55f69c456a07d54f0373f9db9a578b3f10130411c8601cf983279e3779d7529e47616c333770be
-
Filesize
468KB
MD5428066713f225bb8431340fa670671d4
SHA147f6878ff33317c3fc09c494df729a463bda174c
SHA256da6c395a2018d3439ad580a19e6a1ca5ff29ef9074411ee9f9f1b0a6365dfebd
SHA512292aad2762ae4dc519c69411aa114a29894f60ffac103813db4946f2fac4f5a166f66523c421529d6847c0882d8ab467392ee8da1e3a4fca0d6d4e6ebda5b737
-
Filesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
Filesize
696KB
MD5205f21913df40c9b76f2436357a51e43
SHA10fca0dd966272febd21b85a6087973af1e84bbbc
SHA2564406efaeb098cd474722adcaafef58c25b2f267a8984ab339ecb65c91a6dffad
SHA512d0ddf508b7ab4e5a5b9de0558b35e291a1ef3a7384e92284e0a8d13e6fa1a4d64f49d70b5bf8cf60d79b9a0c357b5ecf618a7eca6c43f45a0be7d4ab066c2642
-
Filesize
1KB
MD52754e80d40bcb8b3e8c484d6bada5ffc
SHA14a81edce87b1d1fe356c82208d86e2a9fbc48b04
SHA256551520697e58fde629941ec4f5d5bc78c6980c1ace1d76b2b84d97bc539e632b
SHA512be306b302e5dfd2a4f09daa95b44d328cada7f141a773bc432b011080e5405b5f98be9425c606d29b03b00c6f734d2bb15a538478fcf7c988f68bdc29cb40587