Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll
Resource
win7-20240903-en
General
-
Target
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll
-
Size
692KB
-
MD5
c2b6f8ebb1dd8692d134ed9dd9891cfa
-
SHA1
1a1eb14433d4be1fb5e464c913a478f286fbf991
-
SHA256
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f
-
SHA512
a6a938cdb0718f6757cffbf122d7f36420b78a20df3727872469c8f4bacf131d5ea596c90b148771e95c89cf9ccc10388f36e19098e491c1dbc0a96ff563befe
-
SSDEEP
12288:wqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:wqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3440-3-0x0000000003090000-0x0000000003091000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1632-1-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3440-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3440-34-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/1632-36-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3968-45-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3968-48-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/5024-64-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/4812-79-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
wusa.execmstp.exesdclt.exepid process 3968 wusa.exe 5024 cmstp.exe 4812 sdclt.exe -
Loads dropped DLL 3 IoCs
Processes:
wusa.execmstp.exesdclt.exepid process 3968 wusa.exe 5024 cmstp.exe 4812 sdclt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mmqwm = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\Managed\\DOCUME~1\\1033\\KHwEBY\\cmstp.exe" -
Processes:
rundll32.exewusa.execmstp.exesdclt.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe -
Modifies registry class 3 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 3440 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3440 3440 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3440 wrote to memory of 4980 3440 wusa.exe PID 3440 wrote to memory of 4980 3440 wusa.exe PID 3440 wrote to memory of 3968 3440 wusa.exe PID 3440 wrote to memory of 3968 3440 wusa.exe PID 3440 wrote to memory of 4196 3440 cmstp.exe PID 3440 wrote to memory of 4196 3440 cmstp.exe PID 3440 wrote to memory of 5024 3440 cmstp.exe PID 3440 wrote to memory of 5024 3440 cmstp.exe PID 3440 wrote to memory of 4764 3440 sdclt.exe PID 3440 wrote to memory of 4764 3440 sdclt.exe PID 3440 wrote to memory of 4812 3440 sdclt.exe PID 3440 wrote to memory of 4812 3440 sdclt.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:4980
-
C:\Users\Admin\AppData\Local\n09H9A5j\wusa.exeC:\Users\Admin\AppData\Local\n09H9A5j\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3968
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵PID:4196
-
C:\Users\Admin\AppData\Local\q60\cmstp.exeC:\Users\Admin\AppData\Local\q60\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5024
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:4764
-
C:\Users\Admin\AppData\Local\xMUT9B\sdclt.exeC:\Users\Admin\AppData\Local\xMUT9B\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5924f4e2a003bd39b57a088eb3c4615bf
SHA173bc835fa1c6ab2b27d534a9e221d8ceb330c00a
SHA256c98e84cd952efa8a8f55edeb1f4c56aadb8586c27a50a80e4e3eff08340647e7
SHA5129d1b369cd9af154671f7637ac20dd6c0cc23750f1eedada5f1b475fdb7cf09727942e7019c047bf7c2372ca6f27b882697e89d2d9092a08d0f3325e24e3a68fe
-
Filesize
309KB
MD5e43499ee2b4cf328a81bace9b1644c5d
SHA1b2b55641f2799e3fdb3bea709c9532017bbac59d
SHA2563e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb
SHA51204823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b
-
Filesize
696KB
MD55d67d61df79126de5c4b296d9dbd179a
SHA1228953215e6800734e46dac21bae5704b768c360
SHA256009be3655e0bb1103e0375b54c2ec20e374da5141d24e5bced4246789f6822f6
SHA5120eecf5a15153b2bacb1697f02afc3163bc172d3ae9c935a9fcb63071c1da9a9c070527d445c4f4f41f49bfa4e7a8c7cc26a9806c1d566c27bbad777ba1841b9c
-
Filesize
96KB
MD54cc43fe4d397ff79fa69f397e016df52
SHA18fd6cf81ad40c9b123cd75611860a8b95c72869c
SHA256f2d3905ee38b2b5c0b724d582f14eb1db7621ffb8f3826df686a20784341614c
SHA512851ef9fa5a03ec8b9fea0094c6e4bfa0b9e71cee3412ee86b2dfc34682aa5fb6455fefe7fc0092b711956d7c880cf8a5761b63ee990aa8e72f3473086ac0f157
-
Filesize
696KB
MD5ac0c5044fe70aa1f9a81325b050a60ba
SHA1a2b4dcf285d50b7595ce5f99a22f89ff392a2ca5
SHA2566701af47ee04a0458835b717acaf3afd37dbe03a6df0c231c7739f515c2e22a8
SHA51207eccf6159c6f04d42dfa1be9208b265b5aca8b17e6739eaa0f592c5183420d643efd4d21336972743176f6259fc77a28d0dd8f88fd6babcb57639bc9f573d0a
-
Filesize
1.2MB
MD5e09d48f225e7abcab14ebd3b8a9668ec
SHA11c5b9322b51c09a407d182df481609f7cb8c425d
SHA256efd238ea79b93d07852d39052f1411618c36e7597e8af0966c4a3223f0021dc3
SHA512384d606b90c4803e5144b4de24edc537cb22dd59336a18a58d229500ed36aec92c8467cae6d3f326647bd044d8074931da553c7809727fb70227e99c257df0b4
-
Filesize
1KB
MD504bf7c06a981c06d247792578cda37c0
SHA1353f10a4dacfab8805e8ee399ff72c0d0af4dede
SHA256995f7312be458dc1ab3c0c7a6ad0a0198ba17c50b7cf162be5ed0d42ac01e7d8
SHA5129ce9fcb0c792f83770b7a3197ac5fd37856cffcf9bb7956501ded7a88704b29c1b5943786defb3cfc7992dbc13b4e6c0c45f221250673c7af2ff0c951ea504d7