Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll
Resource
win7-20240903-en
General
-
Target
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll
-
Size
692KB
-
MD5
65411740b33c7475d67552a92d3c4054
-
SHA1
d1191e086f3faa2f2168a28eac66d7360c94d5e9
-
SHA256
87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447
-
SHA512
3bdb279bba9946af41d4bccc9b2bed4c8f37fc03d0cc53d0845311645ba39d6a30ca0e8d6bbe7bc8a1d94c8cacaeb8f515686b226e59b8ec06f6d6242c85fb03
-
SSDEEP
12288:cqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:cqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1208-4-0x0000000002500000-0x0000000002501000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2312-0-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1208-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1208-33-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1208-35-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/2312-42-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/2836-52-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2836-56-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2712-72-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1488-82-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload behavioral1/memory/1488-86-0x0000000140000000-0x00000001400E1000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
slui.exedwm.exeWindowsAnytimeUpgradeResults.exepid Process 2836 slui.exe 2712 dwm.exe 1488 WindowsAnytimeUpgradeResults.exe -
Loads dropped DLL 7 IoCs
Processes:
slui.exedwm.exeWindowsAnytimeUpgradeResults.exepid Process 1208 2836 slui.exe 1208 2712 dwm.exe 1208 1488 WindowsAnytimeUpgradeResults.exe 1208 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wtobeyey = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\VR28FS~1\\dwm.exe" -
Processes:
dwm.exeWindowsAnytimeUpgradeResults.exerundll32.exeslui.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2312 rundll32.exe 2312 rundll32.exe 2312 rundll32.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1208 wrote to memory of 2580 1208 31 PID 1208 wrote to memory of 2580 1208 31 PID 1208 wrote to memory of 2580 1208 31 PID 1208 wrote to memory of 2836 1208 32 PID 1208 wrote to memory of 2836 1208 32 PID 1208 wrote to memory of 2836 1208 32 PID 1208 wrote to memory of 2616 1208 33 PID 1208 wrote to memory of 2616 1208 33 PID 1208 wrote to memory of 2616 1208 33 PID 1208 wrote to memory of 2712 1208 34 PID 1208 wrote to memory of 2712 1208 34 PID 1208 wrote to memory of 2712 1208 34 PID 1208 wrote to memory of 1860 1208 35 PID 1208 wrote to memory of 1860 1208 35 PID 1208 wrote to memory of 1860 1208 35 PID 1208 wrote to memory of 1488 1208 36 PID 1208 wrote to memory of 1488 1208 36 PID 1208 wrote to memory of 1488 1208 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87f7e4782faff19b704c3881d94a1ba35fefd2ffe10b55399af5a9ca43227447.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2580
-
C:\Users\Admin\AppData\Local\IuDcHb86y\slui.exeC:\Users\Admin\AppData\Local\IuDcHb86y\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2836
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:2616
-
C:\Users\Admin\AppData\Local\V04\dwm.exeC:\Users\Admin\AppData\Local\V04\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2712
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵PID:1860
-
C:\Users\Admin\AppData\Local\XwhK2vi\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\XwhK2vi\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5812df921029c6cf8186f78091f33600d
SHA1bd03fe6c14855dcd87014572b0d02e53fc007ab5
SHA256365f7730368c571df259d086c7c2a545492c6261d1fac3c7242caf0672d25913
SHA512ffd8e8579a0560c274c8d0c8bf711b567b3a9586d749904214eb9045ffba1b742b7ef25e22857b22547ac7cbd4d5480929d9d35ac6a8a061a24f9423e926a951
-
Filesize
696KB
MD56d128ebd14461e34cb46bc14ffc4b11c
SHA12b8f1c14bc431974add07ada3a2888b4e7ea3b95
SHA25651b3a58bf6cfbdf980666237207d6b61d0111994a6d5ee9c9eb86ea7bb6df928
SHA512bedafe72fe6662fc0ad04e1ebbbd722e5f519c161fca6ed5d8fe584b63553f948931e6126fc6582ac7ee2c0df9c795f3991c889a8981aa104075f54113df2b6e
-
Filesize
900KB
MD53b7c0362c8aa3a036544701e919b3b4b
SHA15b49ad8add19f46781a8cab414afdd236591f07c
SHA256175ce01f3b8b78edb09432586491447b6d166d54c6bce0674defbb0912853889
SHA5124187d70447f9551c2c3454c011380efee8520cb353015e2bc57a32bf05c0810b72c573beed257038703e2924a2b3bbb0076cb744a45f25dd7d32165191f473e4
-
Filesize
1KB
MD55faae1ee155dac867214c9371e7cfc86
SHA1f40926d6633d925319dbd17ca3e526de86707772
SHA256aef1eaf6cb58b89b9c5d73af318a8a42914f695b723f2dd3d9a0a0c5931091f8
SHA5120c10e87d0a530407c30682fbc2c87d92f5ddb91d19531dd4be229ac83a2995be4b0ae024580c8c4b641d8ca25e6b3c0266816f9fac38dfc24b4b4ab3337d38b4
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
Filesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e