Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
075ab26a20020aabdf6ff42b86a7b852167bc3ecdb5bf72f7891bd639779b285.dll
Resource
win7-20240729-en
General
-
Target
075ab26a20020aabdf6ff42b86a7b852167bc3ecdb5bf72f7891bd639779b285.dll
-
Size
720KB
-
MD5
547cff20a7fecb219285e1cc582b413c
-
SHA1
4407b461b33bfaf3092ac7d8a8d9621ed2fb6200
-
SHA256
075ab26a20020aabdf6ff42b86a7b852167bc3ecdb5bf72f7891bd639779b285
-
SHA512
a0f789c5641cb62335567f533a8b86e8da02a5b66698e9e1cf21927161861f6a74b847f115c73c35c4d19dffec12cefaf90f5a9783b1824b52481cc49b3a841e
-
SSDEEP
12288:5qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:5qGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1260-4-0x00000000024F0000-0x00000000024F1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2124-0-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1260-23-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1260-34-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1260-35-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/2124-43-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/2808-53-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral1/memory/2808-57-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral1/memory/2684-74-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral1/memory/2992-90-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
tcmsetup.exeUI0Detect.exerrinstaller.exepid Process 2808 tcmsetup.exe 2684 UI0Detect.exe 2992 rrinstaller.exe -
Loads dropped DLL 7 IoCs
Processes:
tcmsetup.exeUI0Detect.exerrinstaller.exepid Process 1260 2808 tcmsetup.exe 1260 2684 UI0Detect.exe 1260 2992 rrinstaller.exe 1260 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Excel\\FeQb\\UI0Detect.exe" -
Processes:
rundll32.exetcmsetup.exeUI0Detect.exerrinstaller.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2124 rundll32.exe 2124 rundll32.exe 2124 rundll32.exe 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1260 wrote to memory of 2980 1260 31 PID 1260 wrote to memory of 2980 1260 31 PID 1260 wrote to memory of 2980 1260 31 PID 1260 wrote to memory of 2808 1260 32 PID 1260 wrote to memory of 2808 1260 32 PID 1260 wrote to memory of 2808 1260 32 PID 1260 wrote to memory of 1912 1260 33 PID 1260 wrote to memory of 1912 1260 33 PID 1260 wrote to memory of 1912 1260 33 PID 1260 wrote to memory of 2684 1260 34 PID 1260 wrote to memory of 2684 1260 34 PID 1260 wrote to memory of 2684 1260 34 PID 1260 wrote to memory of 1044 1260 35 PID 1260 wrote to memory of 1044 1260 35 PID 1260 wrote to memory of 1044 1260 35 PID 1260 wrote to memory of 2992 1260 36 PID 1260 wrote to memory of 2992 1260 36 PID 1260 wrote to memory of 2992 1260 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\075ab26a20020aabdf6ff42b86a7b852167bc3ecdb5bf72f7891bd639779b285.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵PID:2980
-
C:\Users\Admin\AppData\Local\1Fv\tcmsetup.exeC:\Users\Admin\AppData\Local\1Fv\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2808
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵PID:1912
-
C:\Users\Admin\AppData\Local\Yqg9\UI0Detect.exeC:\Users\Admin\AppData\Local\Yqg9\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2684
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:1044
-
C:\Users\Admin\AppData\Local\qDDaS\rrinstaller.exeC:\Users\Admin\AppData\Local\qDDaS\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
728KB
MD5c83fa833b08831c68357eada5009e44a
SHA16ae64635f6991efd40da827045e188f18a748943
SHA2562214d25f8061e5a87dab2fa5fcaf4d3775e4e095f4d847730221b63fbf4afc8c
SHA51283bbfdb021e4e0aebc0c518322331807d89a8690b786c59fb586fc59be686fbfa104e8ecceb37dd46b0a25a2275ed7825765cf7ffd376bf5b44ed0aa7ac86c0c
-
Filesize
728KB
MD580def0f2f2936870aca5eb67fdc2cae7
SHA1c2aa692888c7d54ac37194ce5bb660b4f81c4ab7
SHA25606dc95c8f78811b9d3b054befe9398c0521ea40b69ab64d6e67477cedfb644f7
SHA512f19dafdfd8ae686252f6e521fb1252ab604482842ddd0c29b6c94565c3774748565e71b2e488bade1fd3c976286a2f3aaaf270e6dde1baf5bcca144e3a968e44
-
Filesize
728KB
MD58d73c750361f343d9d5c7178e37276cb
SHA183cceea7f4cad88eb98888ae346c4b5eebffc1de
SHA256b2f261a0034e913e36a78ade37c0272e03645c5fd0a541609410b08b6fe5f99b
SHA512648418e81bd9ff637e020b749757e981ddd5202c9fa10c7a09be894b216851adaba38638eeea5c23cb6284470eab0aff3cd4af40f93af290eccb065f015ce598
-
Filesize
1KB
MD5ac6a09229e4523573097589ff81e0079
SHA1de90f6d2de12b245b7b265ff98784b89c0bbf7cc
SHA25682e9b8995d84721999f38bb298a3424c8e18329d51897143deb1dfcfd8412e8c
SHA512cdb659fee7b8ec3d5f882ca57f2ec37611ed14f5049f1d5c472cb932b3a56fa88cf230cb537fc3f4d73a6396706dfba2e81d2bb6f1681d24a8d4498c2f7ba99a
-
Filesize
15KB
MD50b08315da0da7f9f472fbab510bfe7b8
SHA133ba48fd980216becc532466a5ff8476bec0b31c
SHA256e19556bb7aa39bbd5f0d568a95aec0b3af18dda438cc5737f945243b24d106e7
SHA512c30501546efe2b0c003ef87ac381e901c69ddfc6791c6a5102cff3a07f56555d94995a4413b93036821aa214fc31501fa87eb519e1890ef75b2ec497983ffd58
-
Filesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4