Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
bbd6d896a535b1e9b382eda903972c62e1aeb045c9fb4057a8aae51feb85eeca.dll
Resource
win7-20240903-en
General
-
Target
bbd6d896a535b1e9b382eda903972c62e1aeb045c9fb4057a8aae51feb85eeca.dll
-
Size
720KB
-
MD5
f859e1567e45f47b3b3746c4fb49e3f5
-
SHA1
e824cabc3b25fe5173ff02fbb4b3e7912bd71a72
-
SHA256
bbd6d896a535b1e9b382eda903972c62e1aeb045c9fb4057a8aae51feb85eeca
-
SHA512
bc5b15dbe0dbb3f77dca8839123c95e77a2733af33827fc911e24404ab1dd793f04cab91669a075ab7fef7f6fa1d64ef6c8888d642a862c07a90c41ea3ebc29b
-
SSDEEP
12288:ZqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:ZqGBHTxvt+g2gYed
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1224-4-0x0000000002540000-0x0000000002541000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2096-0-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1224-23-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1224-34-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1224-35-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/2096-43-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/2748-53-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral1/memory/2748-57-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral1/memory/2632-69-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral1/memory/2632-74-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral1/memory/1320-86-0x0000000140000000-0x00000001400BB000-memory.dmp dridex_payload behavioral1/memory/1320-90-0x0000000140000000-0x00000001400BB000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2748 rdpclip.exe 2632 BdeUISrv.exe 1320 eudcedit.exe -
Loads dropped DLL 7 IoCs
pid Process 1224 Process not Found 2748 rdpclip.exe 1224 Process not Found 2632 BdeUISrv.exe 1224 Process not Found 1320 eudcedit.exe 1224 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rtunysabu = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\#SHARE~1\\tk0pM\\BdeUISrv.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2948 1224 Process not Found 31 PID 1224 wrote to memory of 2948 1224 Process not Found 31 PID 1224 wrote to memory of 2948 1224 Process not Found 31 PID 1224 wrote to memory of 2748 1224 Process not Found 32 PID 1224 wrote to memory of 2748 1224 Process not Found 32 PID 1224 wrote to memory of 2748 1224 Process not Found 32 PID 1224 wrote to memory of 2616 1224 Process not Found 33 PID 1224 wrote to memory of 2616 1224 Process not Found 33 PID 1224 wrote to memory of 2616 1224 Process not Found 33 PID 1224 wrote to memory of 2632 1224 Process not Found 34 PID 1224 wrote to memory of 2632 1224 Process not Found 34 PID 1224 wrote to memory of 2632 1224 Process not Found 34 PID 1224 wrote to memory of 1492 1224 Process not Found 35 PID 1224 wrote to memory of 1492 1224 Process not Found 35 PID 1224 wrote to memory of 1492 1224 Process not Found 35 PID 1224 wrote to memory of 1320 1224 Process not Found 36 PID 1224 wrote to memory of 1320 1224 Process not Found 36 PID 1224 wrote to memory of 1320 1224 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bbd6d896a535b1e9b382eda903972c62e1aeb045c9fb4057a8aae51feb85eeca.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:2948
-
C:\Users\Admin\AppData\Local\FX6\rdpclip.exeC:\Users\Admin\AppData\Local\FX6\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2748
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:2616
-
C:\Users\Admin\AppData\Local\HQnEdT\BdeUISrv.exeC:\Users\Admin\AppData\Local\HQnEdT\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2632
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:1492
-
C:\Users\Admin\AppData\Local\G6zX3Xj\eudcedit.exeC:\Users\Admin\AppData\Local\G6zX3Xj\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
Filesize
748KB
MD5692e2690beffab8e4647dd345cae9f32
SHA10a64c22f1e37a4f819ff01ffaf6ff5e976decfde
SHA256bfb8b0262ff986401bd85214f3d6d5f02c1747fa8fcc4ee5c9fe710708114ac3
SHA512e218714a39b38674ff1385cb59b26651b329a6bade31b673dd4134c15c7baa3aae3de909f48fec9e5d253f2a2d00128b0c9858624b1b7611f5e6fa7e18c07cda
-
Filesize
724KB
MD590bcf6dc6d3dc83120b76e8dcfada772
SHA1df381b38b5f6d4c2848e459bc65cda0ddcb9a41f
SHA2565b67da10e5a9cd2d45204ed85e79ad4d6b5e7ea38816e160feef23157f1d7eff
SHA51295fabb559bd341716f89996a5bdb8da3b235838ab3f09b1291648561a708474f699ed08cfc29e0e40c065574dfc02629bdced8f55a10dca30a319efad756b03b
-
Filesize
1KB
MD5e329495a0a2940c59c4009e4972c24c7
SHA1ecc236f4f72564e4308c3f37d94c16eca4b8368b
SHA25606da62b71f9400b25c7495fb6c320b73ff52f81d4c8b6ea6a4ace4b9ff384e82
SHA51270a091375f243298e066472ec53e01ab2e10647089ee7783e33fd84fec0713e3526268ef78c01a573bbdb43cba7c85d46064f521b63a868a4fbd14490c797149
-
Filesize
728KB
MD5fd176ed6ca5efa21185ccdaa47d6542b
SHA1a5c0e1abadace85ee04f69530c4e68da7f61bc70
SHA2568ba67d4d6f643c90d2f18bbb6ac399cf057d6308ee399b00911a01698f138858
SHA5128b07d1db3e07ca89d445bb3f3bfee4421d7affa9401cee018e4a84a962ddecd136af47cd44d6b5e39d15d907feda874debca6ecc36ad495115600d70c65d597b
-
Filesize
351KB
MD535e397d6ca8407b86d8a7972f0c90711
SHA16b39830003906ef82442522d22b80460c03f6082
SHA2561f64118bdc3515e8e9fce6ad182f6d0c8a6528d638fedb4901a6152cde4c7cde
SHA51271b0c4ac120e5841308b0c19718bdc28366b0d79c8177091328ef5421392b9ee5e4758816ffb8c0977f178e1b33ed064f64781eaf7d6952878dc8aea402f035e
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6