Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll
Resource
win10v2004-20241007-en
General
-
Target
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll
-
Size
692KB
-
MD5
c2b6f8ebb1dd8692d134ed9dd9891cfa
-
SHA1
1a1eb14433d4be1fb5e464c913a478f286fbf991
-
SHA256
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f
-
SHA512
a6a938cdb0718f6757cffbf122d7f36420b78a20df3727872469c8f4bacf131d5ea596c90b148771e95c89cf9ccc10388f36e19098e491c1dbc0a96ff563befe
-
SSDEEP
12288:wqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:wqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1232-4-0x0000000002A50000-0x0000000002A51000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1900-0-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1232-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1232-33-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1232-34-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1900-42-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/2624-51-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/2624-56-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1324-73-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral1/memory/1932-89-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
p2phost.exeicardagt.exeSoundRecorder.exepid process 2624 p2phost.exe 1324 icardagt.exe 1932 SoundRecorder.exe -
Loads dropped DLL 7 IoCs
Processes:
p2phost.exeicardagt.exeSoundRecorder.exepid process 1232 2624 p2phost.exe 1232 1324 icardagt.exe 1232 1932 SoundRecorder.exe 1232 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcbsdqtxprcnbm = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\fL\\icardagt.exe" -
Processes:
rundll32.exep2phost.exeicardagt.exeSoundRecorder.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA p2phost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoundRecorder.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exep2phost.exepid process 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 2624 p2phost.exe 2624 p2phost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1232 wrote to memory of 2572 1232 p2phost.exe PID 1232 wrote to memory of 2572 1232 p2phost.exe PID 1232 wrote to memory of 2572 1232 p2phost.exe PID 1232 wrote to memory of 2624 1232 p2phost.exe PID 1232 wrote to memory of 2624 1232 p2phost.exe PID 1232 wrote to memory of 2624 1232 p2phost.exe PID 1232 wrote to memory of 2648 1232 icardagt.exe PID 1232 wrote to memory of 2648 1232 icardagt.exe PID 1232 wrote to memory of 2648 1232 icardagt.exe PID 1232 wrote to memory of 1324 1232 icardagt.exe PID 1232 wrote to memory of 1324 1232 icardagt.exe PID 1232 wrote to memory of 1324 1232 icardagt.exe PID 1232 wrote to memory of 1088 1232 SoundRecorder.exe PID 1232 wrote to memory of 1088 1232 SoundRecorder.exe PID 1232 wrote to memory of 1088 1232 SoundRecorder.exe PID 1232 wrote to memory of 1932 1232 SoundRecorder.exe PID 1232 wrote to memory of 1932 1232 SoundRecorder.exe PID 1232 wrote to memory of 1932 1232 SoundRecorder.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
C:\Windows\system32\p2phost.exeC:\Windows\system32\p2phost.exe1⤵PID:2572
-
C:\Users\Admin\AppData\Local\Cz8\p2phost.exeC:\Users\Admin\AppData\Local\Cz8\p2phost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵PID:2648
-
C:\Users\Admin\AppData\Local\YyUxID16\icardagt.exeC:\Users\Admin\AppData\Local\YyUxID16\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1324
-
C:\Windows\system32\SoundRecorder.exeC:\Windows\system32\SoundRecorder.exe1⤵PID:1088
-
C:\Users\Admin\AppData\Local\dtBl166h\SoundRecorder.exeC:\Users\Admin\AppData\Local\dtBl166h\SoundRecorder.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD502f1e26d8f1efc350c808aedebf1cfd2
SHA1e50c93242c7adaa23947ae9a7b9e194d4bce0b78
SHA256423a1585108d72e8c58e7657ecfbd58aad26c20d90ed1f4935c8d492431bd470
SHA512dca26299b1870ab70f676a54143510659937bdec298ca61142f223d8ce356814c9f0196a6b98c8e605e1f94e4af61d707ee5e42f9e0a915d545bb9635136b044
-
Filesize
696KB
MD544759a9b65ddbaef9d39d5f0dfe6515f
SHA13e22a3068d1bbcd61eb8c9a7cabff93f0cdd5673
SHA256a3211f2a2b42ecced33941ed6ee273430d377f6e05ba4b61c9c7df8bc00fa284
SHA51286023889e51b00d532f51977a996a2053a0c4ba22490f7353eca8e71d0bea4460c8774be4359e622e6b27daaec4e304062641ff362342130c312267b075cac66
-
Filesize
696KB
MD5406bb96fe3b8cf0c25724407018fc600
SHA112c3f3d107216803dee1d7e15a635712b8729fb7
SHA2565ee04cb80d620a9c6d5fd613cd5ac57f904b6678f2951f2cc09e6c8f2e11712f
SHA5122d571f9efaba47124ba4940ac10602f0b7521cbbb90654cb0e6fa5a77470ded385761a500b733270913a5c9e92b82a70b3e1244d5f3ecb4e960b13f0a2752b50
-
Filesize
1KB
MD545e698334ce2ec2e5c7b99e6f7a7e539
SHA1834ea1f60c579b3da841fcaa4bbd6f131840de30
SHA256593db82b6faa790a56c92256d92dcd6c5b79079ce3f7f24cf637c98c1f3ef1bd
SHA51258124c0f99d970115260b13e0929071d5ab35d3720bb2e710a40e87140b1740fbc19a8fd03b1b17939de7e3201c9f86f4604d876214a4974dd308a38aac226fb
-
Filesize
172KB
MD50dbd420477352b278dfdc24f4672b79c
SHA1df446f25be33ac60371557717073249a64e04bb2
SHA2561baba169de6c8f3b3c33cea96314c67b709a171bdc8ea9c250a0d016db767345
SHA51284014b2dcc00f9fa1a337089ad4d4abcaa9e3155171978ec07bc155ddaebebfabb529d8de3578e564b3aae59545f52d71af173ebb50d2af252f219ac60b453d1
-
Filesize
1.3MB
MD52fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
Filesize
139KB
MD547f0f526ad4982806c54b845b3289de1
SHA18420ea488a2e187fe1b7fcfb53040d10d5497236
SHA256e81b11fe30b16fa4e3f08810513c245248adce8566355a8f2a19c63b1143ff5b
SHA5124c9a1aa5ed55087538c91a77d7420932263b69e59dc57b1db738e59624265b734bf29e2b6ed8d0adb2e0dec5763bfbf86876fd7d1139c21e829001c7868d515d