Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
075ab26a20020aabdf6ff42b86a7b852167bc3ecdb5bf72f7891bd639779b285.dll
Resource
win7-20240903-en
General
-
Target
075ab26a20020aabdf6ff42b86a7b852167bc3ecdb5bf72f7891bd639779b285.dll
-
Size
720KB
-
MD5
547cff20a7fecb219285e1cc582b413c
-
SHA1
4407b461b33bfaf3092ac7d8a8d9621ed2fb6200
-
SHA256
075ab26a20020aabdf6ff42b86a7b852167bc3ecdb5bf72f7891bd639779b285
-
SHA512
a0f789c5641cb62335567f533a8b86e8da02a5b66698e9e1cf21927161861f6a74b847f115c73c35c4d19dffec12cefaf90f5a9783b1824b52481cc49b3a841e
-
SSDEEP
12288:5qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:5qGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-4-0x0000000002D00000-0x0000000002D01000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2896-0-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1196-23-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1196-34-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1196-35-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/2896-43-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/2676-53-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral1/memory/2676-57-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral1/memory/3016-74-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral1/memory/2944-90-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
psr.exesethc.exeBdeUISrv.exepid process 2676 psr.exe 3016 sethc.exe 2944 BdeUISrv.exe -
Loads dropped DLL 7 IoCs
Processes:
psr.exesethc.exeBdeUISrv.exepid process 1196 2676 psr.exe 1196 3016 sethc.exe 1196 2944 BdeUISrv.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wtobeyey = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\QDaX0qEt\\sethc.exe" -
Processes:
psr.exesethc.exeBdeUISrv.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 2628 1196 psr.exe PID 1196 wrote to memory of 2628 1196 psr.exe PID 1196 wrote to memory of 2628 1196 psr.exe PID 1196 wrote to memory of 2676 1196 psr.exe PID 1196 wrote to memory of 2676 1196 psr.exe PID 1196 wrote to memory of 2676 1196 psr.exe PID 1196 wrote to memory of 2824 1196 sethc.exe PID 1196 wrote to memory of 2824 1196 sethc.exe PID 1196 wrote to memory of 2824 1196 sethc.exe PID 1196 wrote to memory of 3016 1196 sethc.exe PID 1196 wrote to memory of 3016 1196 sethc.exe PID 1196 wrote to memory of 3016 1196 sethc.exe PID 1196 wrote to memory of 2552 1196 BdeUISrv.exe PID 1196 wrote to memory of 2552 1196 BdeUISrv.exe PID 1196 wrote to memory of 2552 1196 BdeUISrv.exe PID 1196 wrote to memory of 2944 1196 BdeUISrv.exe PID 1196 wrote to memory of 2944 1196 BdeUISrv.exe PID 1196 wrote to memory of 2944 1196 BdeUISrv.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\075ab26a20020aabdf6ff42b86a7b852167bc3ecdb5bf72f7891bd639779b285.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2628
-
C:\Users\Admin\AppData\Local\MlnKZLAWq\psr.exeC:\Users\Admin\AppData\Local\MlnKZLAWq\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2676
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:2824
-
C:\Users\Admin\AppData\Local\ld4NHIWiC\sethc.exeC:\Users\Admin\AppData\Local\ld4NHIWiC\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3016
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:2552
-
C:\Users\Admin\AppData\Local\bUQN4HCT\BdeUISrv.exeC:\Users\Admin\AppData\Local\bUQN4HCT\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD554c74f550e4bc739ede8637e24f3b4e5
SHA1f29c6c882c5c6c33d315dbdc1f69c84cf5ffde65
SHA2566f9a6e727ec10475f7a6af8177856bd8e60acf52d86271d0492f664c46afff8e
SHA512cf85773270bb7bc257047d955008d0f13e8ed9e36e807bd5118eeeb7799d3033611486f3178586a1e233012add182cf233ffd21077249b614344b9df08e5c78c
-
Filesize
724KB
MD5ed290989572e5a3c2df0146b7378d266
SHA1f86d0ab61127d800fecae6b53f636cf287983538
SHA25643222f0be36f50371df387cae660de19a77bb81ac1f851c3f2d688befd59c42e
SHA51265edc4cc7f76512d2e8b534e3d9d3970ac2408921811874c8a453c7b951003bab31ef4101d4bb73f5f3ec3993cf897e25d28b9574504b7a4bb667bdd0d02b023
-
Filesize
724KB
MD59a4db5b8dc792ed7b11b0a2f2af2195d
SHA1d3c6513203c1c37ef1fd0af18cb5dd1491cd4852
SHA256beb0e9984131c907b3460118f05040bc3d639d8990f1e8cd61003b6859b68107
SHA5128da13a0ed74ddf4a423e197e03ac166ea77129a9b699c85bcb0101eb58bcb6202c98573cf3f3124a0c61e23d2b2161d543cf6f6f6b460108bf4d0cb7a37fdf89
-
Filesize
272KB
MD53bcb70da9b5a2011e01e35ed29a3f3f3
SHA19daecb1ee5d7cbcf46ee154dd642fcd993723a9b
SHA256dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5
SHA51269d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df
-
Filesize
1KB
MD5d81957d78c33003337c242d038c8f357
SHA156f559b93172b75545badc48b8d7857cbf8d82ec
SHA25606395a0c924695d18d96c9ec77d2a3e84968f72a4f8e2adc608533d7c5683fc4
SHA512665b1d89314eb0eeb3a3d968d6193cfe9a6ac893cf4ecafdcab52c4f725c705972b1c68fdf56c073d892e8c0ea7a46318fc6dd3e94054077797409eb18e4ed85
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6