Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
328aa9b1065fe77cc18f9c738b30eb12b1c1bb7c857fd91b075440d5e725885a.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
328aa9b1065fe77cc18f9c738b30eb12b1c1bb7c857fd91b075440d5e725885a.dll
Resource
win10v2004-20241007-en
General
-
Target
328aa9b1065fe77cc18f9c738b30eb12b1c1bb7c857fd91b075440d5e725885a.dll
-
Size
696KB
-
MD5
09eac984a186ff4bc57bbf0d7a04057b
-
SHA1
fbef060f577b7aac6346db2072fc852aa4832b20
-
SHA256
328aa9b1065fe77cc18f9c738b30eb12b1c1bb7c857fd91b075440d5e725885a
-
SHA512
a690df7c00db4aa59b6a19995754820fc704a8f3524ce4394f8f99e2086b83ba835be63e490e63b59641c2e5ffd7cd575a4313021172351afe5d986a6a50980e
-
SSDEEP
12288:RqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:RqGBHTxvt+g2gYed
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3424-3-0x0000000002A60000-0x0000000002A61000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/3920-1-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3424-34-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3424-23-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3920-37-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3824-44-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3824-49-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/968-60-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload behavioral2/memory/968-65-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload behavioral2/memory/5004-79-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 3824 dccw.exe 968 WindowsActionDialog.exe 5004 Magnify.exe -
Loads dropped DLL 3 IoCs
pid Process 3824 dccw.exe 968 WindowsActionDialog.exe 5004 Magnify.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sarxmtvezib = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Security\\k9n\\WindowsActionDialog.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsActionDialog.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3920 rundll32.exe 3920 rundll32.exe 3920 rundll32.exe 3920 rundll32.exe 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3424 Process not Found Token: SeCreatePagefilePrivilege 3424 Process not Found Token: SeShutdownPrivilege 3424 Process not Found Token: SeCreatePagefilePrivilege 3424 Process not Found Token: SeShutdownPrivilege 3424 Process not Found Token: SeCreatePagefilePrivilege 3424 Process not Found Token: SeShutdownPrivilege 3424 Process not Found Token: SeCreatePagefilePrivilege 3424 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3424 Process not Found 3424 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3424 wrote to memory of 3708 3424 Process not Found 94 PID 3424 wrote to memory of 3708 3424 Process not Found 94 PID 3424 wrote to memory of 3824 3424 Process not Found 95 PID 3424 wrote to memory of 3824 3424 Process not Found 95 PID 3424 wrote to memory of 4380 3424 Process not Found 96 PID 3424 wrote to memory of 4380 3424 Process not Found 96 PID 3424 wrote to memory of 968 3424 Process not Found 97 PID 3424 wrote to memory of 968 3424 Process not Found 97 PID 3424 wrote to memory of 3924 3424 Process not Found 98 PID 3424 wrote to memory of 3924 3424 Process not Found 98 PID 3424 wrote to memory of 5004 3424 Process not Found 99 PID 3424 wrote to memory of 5004 3424 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\328aa9b1065fe77cc18f9c738b30eb12b1c1bb7c857fd91b075440d5e725885a.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵PID:3708
-
C:\Users\Admin\AppData\Local\XxcsENqYk\dccw.exeC:\Users\Admin\AppData\Local\XxcsENqYk\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3824
-
C:\Windows\system32\WindowsActionDialog.exeC:\Windows\system32\WindowsActionDialog.exe1⤵PID:4380
-
C:\Users\Admin\AppData\Local\SjdQ\WindowsActionDialog.exeC:\Users\Admin\AppData\Local\SjdQ\WindowsActionDialog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:968
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:3924
-
C:\Users\Admin\AppData\Local\iqhX\Magnify.exeC:\Users\Admin\AppData\Local\iqhX\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
976KB
MD5e7cf4aa25e8ad2a8587f599f9b01e220
SHA17994713d30a476d01c4b7a365e062ae636ac4cdb
SHA2562b919e15b86bd91089e7a543be0e7d0ad09cb944bfb7610f239c16c124596eaa
SHA512cdecbf7bc27003966f766a69957041c196576a234b70fd75154ac38ae46931ecf63ff58212ba8382f9eed4f43a40849b15e4a5e43449f65c6e1e50fb2f94e2e4
-
Filesize
61KB
MD573c523b6556f2dc7eefc662338d66f8d
SHA11e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5
SHA2560c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31
SHA51269d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912
-
Filesize
101KB
MD5cb9374911bf5237179785c739a322c0f
SHA13f4d3dd3d58c9f19dfbb414ded16969ebd9f74b9
SHA256f7f3300b78148a34f6a35796c777a832b638b6d3193e11f4a37f45d4c6dfa845
SHA5129d47521538148b1823c0a17baa86ddf932f06f46d5d8b63fa87b2cc220fb98ce3f933e32d771222937bb8e41c88030839d489d1cd78b062bffeb2980dc6864be
-
Filesize
700KB
MD519c652cdf0619fa524b78c4b745bc166
SHA1ed3a92da202888e0058edfae181536a7857730a4
SHA25665ad2abc4ef7d966436b985078d40a16328de79817ad360e50a2167efa811654
SHA51286db413126cc0c2dee83cd5ea26b34897aea1238effc15cf0af0fba8ade9645190bf11dbae17942a7245004f853027c782af0eebf55663ff8f2d5d046e0e4ae3
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
700KB
MD580f5bff8bb555419532434b9407d9f00
SHA177bf15a25bed35282f591509052a48b9c2321ae6
SHA256e61891632ac523db0d385591363a9402a5433032a2b1fa1d7116243a9cfed231
SHA512aae1f8c874440785d8d158189d0a4c98cb9a7afc18611c166284a54422b6dcf36b7db995eaa7ce948c969c4cc4065a35bafb1926d8ec2837a1b9db8e89a37105
-
Filesize
1KB
MD57d79133ffbbfab9743e3245e79df65ae
SHA16debb1ee5549c26807fe9e8eea56d67bf6180bd0
SHA256b5377afba570ce61db57bc473d337efebe80136171f105ad17989b6c0ac79b81
SHA51290beaad27f2ead56f60c24676c3b7ccd788701073388c42b65fbac7fe4001a2da1b36398ec07eab7a5825a921534783174f299cabe25b986acbc635ae9944c83