Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll
Resource
win10v2004-20241007-en
General
-
Target
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll
-
Size
692KB
-
MD5
c2b6f8ebb1dd8692d134ed9dd9891cfa
-
SHA1
1a1eb14433d4be1fb5e464c913a478f286fbf991
-
SHA256
b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f
-
SHA512
a6a938cdb0718f6757cffbf122d7f36420b78a20df3727872469c8f4bacf131d5ea596c90b148771e95c89cf9ccc10388f36e19098e491c1dbc0a96ff563befe
-
SSDEEP
12288:wqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:wqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3560-3-0x0000000002C10000-0x0000000002C11000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/2028-0-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3560-22-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3560-33-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/2028-36-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/2056-43-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/2056-46-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/736-64-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/1872-79-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
ie4ushowIE.exeBdeUISrv.exesethc.exepid process 2056 ie4ushowIE.exe 736 BdeUISrv.exe 1872 sethc.exe -
Loads dropped DLL 3 IoCs
Processes:
ie4ushowIE.exeBdeUISrv.exesethc.exepid process 2056 ie4ushowIE.exe 736 BdeUISrv.exe 1872 sethc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mmqwm = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\Managed\\WORDDO~1\\GXM8QQ~1\\BdeUISrv.exe" -
Processes:
rundll32.exeie4ushowIE.exeBdeUISrv.exesethc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4ushowIE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3560 Token: SeCreatePagefilePrivilege 3560 Token: SeShutdownPrivilege 3560 Token: SeCreatePagefilePrivilege 3560 Token: SeShutdownPrivilege 3560 Token: SeCreatePagefilePrivilege 3560 Token: SeShutdownPrivilege 3560 Token: SeCreatePagefilePrivilege 3560 Token: SeShutdownPrivilege 3560 Token: SeCreatePagefilePrivilege 3560 Token: SeShutdownPrivilege 3560 Token: SeCreatePagefilePrivilege 3560 Token: SeShutdownPrivilege 3560 Token: SeCreatePagefilePrivilege 3560 Token: SeShutdownPrivilege 3560 Token: SeCreatePagefilePrivilege 3560 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3560 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3560 wrote to memory of 4000 3560 ie4ushowIE.exe PID 3560 wrote to memory of 4000 3560 ie4ushowIE.exe PID 3560 wrote to memory of 2056 3560 ie4ushowIE.exe PID 3560 wrote to memory of 2056 3560 ie4ushowIE.exe PID 3560 wrote to memory of 1124 3560 BdeUISrv.exe PID 3560 wrote to memory of 1124 3560 BdeUISrv.exe PID 3560 wrote to memory of 736 3560 BdeUISrv.exe PID 3560 wrote to memory of 736 3560 BdeUISrv.exe PID 3560 wrote to memory of 1748 3560 sethc.exe PID 3560 wrote to memory of 1748 3560 sethc.exe PID 3560 wrote to memory of 1872 3560 sethc.exe PID 3560 wrote to memory of 1872 3560 sethc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9414ec1a9551702c1248ce53e3b9f80fd023fb0393c957f3cc949dfcdfcb11f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
C:\Windows\system32\ie4ushowIE.exeC:\Windows\system32\ie4ushowIE.exe1⤵PID:4000
-
C:\Users\Admin\AppData\Local\mph\ie4ushowIE.exeC:\Users\Admin\AppData\Local\mph\ie4ushowIE.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2056
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:1124
-
C:\Users\Admin\AppData\Local\nGm1TeD\BdeUISrv.exeC:\Users\Admin\AppData\Local\nGm1TeD\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:736
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:1748
-
C:\Users\Admin\AppData\Local\mwO2J\sethc.exeC:\Users\Admin\AppData\Local\mwO2J\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5c67aaadd61b779bb2c0fcd59cc341f45
SHA180107759e70850b4f4a760b0a706169b85aef5e5
SHA256d9add21a1ef369169d53c1cfc581fe006b9f846aa884afc8365c5a2a8be186cc
SHA5124dea297f575c547150abdd90af42985f4bab23f06fcaae543b18f8c3c66aabb1b6ffb220d21ac7bbb2d48de1dbb199f236b762fadc726fb837a44adb947809bc
-
Filesize
76KB
MD59de952f476abab0cd62bfd81e20a3deb
SHA1109cc4467b78dad4b12a3225020ea590bccee3e6
SHA256e9cb6336359ac6f71ac75af2836efb28daa3bafd10a1f0b775dcdc2ec8850a6b
SHA5123cbe50a146ca50b0657a78a2d89a34630c69823005668906785b2d2015cc6139c8dbbf7aefa5fe55957ef55ae06e758933b3b41eaf822e49dba3b7700582e2c9
-
Filesize
696KB
MD5dcbb64931e5bab559961bb0c9e6631e1
SHA180125a7469adca3600c4ec878daf1986b0fd9e4a
SHA25658210b8111e567d57dfc8223df9bad8ee241178fab28a638f0b8a6de49417c68
SHA512952181903f801b16c8cc139f4a6719c39aeceeebf559edc922f48ed0fca1c1d8816d014ace1883c525ddc24877ebf9e29ac5e2c5665535bd0035915b6a479f5a
-
Filesize
104KB
MD58ba3a9702a3f1799431cad6a290223a6
SHA19c7dc9b6830297c8f759d1f46c8b36664e26c031
SHA256615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8
SHA512680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746
-
Filesize
54KB
MD58595075667ff2c9a9f9e2eebc62d8f53
SHA1c48b54e571f05d4e21d015bb3926c2129f19191a
SHA25620b05c77f898be08737082e969b39f54fa39753c8c0a06142eb7ad5e0764a2db
SHA512080dbcdd9234c07efe6cea4919ffa305fdc381ccebed9d1020dd6551b54e20e52387e62a344502fa4a85249defd0f9b506528b8dd34675bc9f51f664b8fc4d88
-
Filesize
696KB
MD5a95b23b000542406c970070c121d79f8
SHA14e45c9d02984e2d7f8f84ca636b2c14bde83a949
SHA2566cc6b14c9985a41b4d1f5e0d6254992a284176403103e389ce4982d20878a084
SHA5127954e4493c72489c799cf8c6211859f4b7cd43f5df5e8c00703f5e6b16425ed97bd80eee29afcddf631d8a1929d6d58e85fb5b15157cfd9fe619c89458436ad4
-
Filesize
1KB
MD5691283be083c55da4adb1aaec1e857bd
SHA1904eec19e7b81c3acb8bca3b70270936ae4ab856
SHA25683130aeae4a0901d9f81a94a4ee903895a8aa85f47960ed14258d48a87233d13
SHA512723b66e93925266763194f20b1744903738e9155fe6599334eb61bd5f6634fe8f49b9ec54c5e01edf0deef963423979f953d324c330d95900e4b3de9c8f4016a